🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🇸🇪 Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

Scientists Unlock Quantum Computing Power by Entangling Vibrations in a Single Atom
scitechdaily.com·1d
⚛️Quantum Tape
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.com·1d·
Discuss: Hacker News
🎫Kerberos Attacks
Claude Code's 19 cent Parser
blogger.com·18h
🔧Binary Parsers
How Smart Aluminum Fences Are Transforming Business Security
dev.to·10h·
Discuss: DEV
🏠Home Automation
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
arxiv.org·3h
🌳Archive Merkle Trees
Certificate Transparency - Part 3 - Operations
ipng.ch·1d
🔒Hardware Attestation
Barking Up The Ratchet Tree – MLS Is Neither Royal Nor Nude
soatok.blog·16h·
Discuss: Lobsters, Hacker News, r/programming
🔑Cryptographic Protocols
Abhinav Sarkar: A Fast Bytecode VM for Arithmetic: The Compiler
abhinavsarkar.net·2d
🔗Functional Compilers
Can I possibly get some help with this design?
reddit.com·12h·
Discuss: r/homelab
🛣️BGP Hijacking
Risky Bulletin: Hackers sabotage Iranian ships at sea, again
news.risky.biz·1d
🛡Cybersecurity
Feature-Refined Unsupervised Model for Loanword Detection
arxiv.org·3h
📏Manuscript Metrics
Luhn algorithm – Credit card number verification
en.wikipedia.org·2d·
Discuss: Hacker News
🔄CRC Algorithms
Variations on Knuth’s Twindragon
johndcook.com·13h·
Discuss: Hacker News
📐Mathematical Art
Show HN: SecretMemoryLocker – File Encryption Without Static Passwords
news.ycombinator.com·14h·
Discuss: Hacker News
🔐Archive Encryption
Anchorage Digital Ventures: The First Institutional Edge for Protocols
anchorage.com·16h·
Discuss: Hacker News
🔌Interface Evolution
NVFP4 Trains with Precision of 16-Bit and Speed and Efficiency of 4-Bit
developer.nvidia.com·1d·
Discuss: Hacker News
🧠Learned Codecs
Architecting Beliefs for a Contested World
vasily.cc·17h·
Discuss: Hacker News
⚙️systems theory
A Bitcoin Core Code Analysis
binaryigor.com·16h·
Discuss: Hacker News
🧬Bitstream Evolution
A new layer of security for certified Android devices
android-developers.googleblog.com·13h·
Discuss: Hacker News, r/Android
🛡️ARM TrustZone
Sharing Is Scaring: Why Is Cloud File-Sharing Hard?
blog.brownplt.org·15h·
Discuss: Lobsters, Hacker News, r/programming
💧Liquid Types
Loading...Loading more...
AboutBlogChangelogRoadmap