🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🇸🇪 Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

Russia Approves Fines for ‘Extremist’ Searches and VPN Promotion
bloomberg.com·19h
⚖️Legal Compliance
Tresorit – secure file exchange and collaboration made easy
tresorit.com·3d·
Discuss: Hacker News
✅Archive Fixity
The High Stakes of Biometric Surveillance
techpolicy.press·2d·
Discuss: Hacker News
🔐Homomorphic Encryption
Building a Low-Powered NAS
ryan.freumh.org·20m·
Discuss: Hacker News
🏠Homelab Preservation
Just Tried QuickConvert – A Chrome Extension That Converts Currencies and Units
chromewebstore.google.com·2d·
Discuss: Hacker News
🗜️LZW Variants
England see off Sweden in penalty shoot-out to reach semis at women's Euros
rfi.fr·9h
🇸Sweden
Magic and divination in the age of AI
newstatesman.com·1d·
Discuss: Hacker News
🌍Cultural Algorithms
Compiler Bootstrapping in Nixpkgs
blog.obsidian.systems·2d·
Discuss: Lobsters, Hacker News
❄️Nixpkgs
Crates.io Implements Trusted Publishing Support
socket.dev·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
5 Features Every AI-Powered SOC Platform Needs in 2025
securityaffairs.com·1h
🌊Stream Processing
From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection
arxiv.org·2d
🎯Threat Hunting
SIEVE: Effective Filtered Vector Search with Collection of Indexes
arxiv.org·1d
🗂️Vector Databases
From VPN Vulnerability to SASE Victory: How A Growing Fintech Firm Transformed Its Security Posture and Scalability in Under a Week
blog.checkpoint.com·2d
🖥️Self-hosted Infrastructure
Language Models for Adult Service Website Text Analysis
arxiv.org·2d
📝Text Parsing
🛡️ Paladin-mini: Open-Source Grounding Model That Actually Works in Production
dev.to·23h·
Discuss: DEV
⚡Proof Automation
Machine Learning Fundamentals: dimensionality reduction
dev.to·1d·
Discuss: DEV
📐Linear Algebra
Travel Is Up and So Are the Risks 5 Million Public Unsecured Wi-Fi Networks Exposed
zimperium.com·21h
🛡Cybersecurity
Eigenvalues and Eigenvectors: Unveiling the Secrets of Data Transformation in Machine Learning
dev.to·1h·
Discuss: DEV
📐Linear Algebra
Starting Project Now? My 2025 Tech Stack for Full Stack Development
hackernoon.com·1d
🔌Interface Evolution
Unpacking Go Slices: 3 Common Gotchas You Need to Know
dev.to·16h·
Discuss: DEV
⬆️Lambda Lifting
Loading...Loading more...
AboutBlogChangelogRoadmap