🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ‡ΈπŸ‡ͺ Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

An OCC Idea
lambdacreate.comΒ·22h
πŸ—„οΈDatabase Internals
Who is most at risk from the billions of leaked Facebook and Google passwords?
restofworld.orgΒ·1d
πŸ”“Hacking
Single-molecule magnet could lead to stamp-sized hard drives capable of storing 100 times more data
phys.orgΒ·19h
βš›οΈQuantum Tape
The complexity trap: why cybersecurity must be simplified
techradar.comΒ·1d
πŸ›‘Cybersecurity
A New Era of Code Quality: Beyond bugs to supply chain security and dependency health
dev.toΒ·16hΒ·
Discuss: DEV
πŸ”’WASM Capabilities
2025 G7 Data Protection and Privacy Authorities Roundtable Statement
priv.gc.caΒ·2dΒ·
Discuss: Hacker News
πŸ”’Privacy Preserving
AES and Symmetric Key Encryption: The Key to Reliable Data Security
dev.toΒ·3dΒ·
Discuss: DEV
πŸ”Cryptographic Archaeology
AI Agents Can Now Pay Autonomously Thanks to x402 and HTTP 402
hackernoon.comΒ·2h
πŸ”ŒInterface Evolution
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.comΒ·19hΒ·
Discuss: Substack
πŸ¦€Rust Macros
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”’WASM Capabilities
Excalidraw+ Is Now SoC 2 Certified
plus.excalidraw.comΒ·2dΒ·
Discuss: Hacker News
πŸ”PKI Archaeology
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.toΒ·12hΒ·
Discuss: DEV
πŸ”—Data Provenance
Taming the Wild West of ML: Practical Model Signing with Sigstore on Kaggle - DevConf.CZ 2025
youtube.comΒ·2h
πŸ’§Liquid Types
Critical Security Importance Digital Age Web Techniques(1750818928214500οΌ‰
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”’WASM Capabilities
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.orgΒ·6h
πŸ“ƒManuscript Tokenization
LayerZero
arxiv.orgΒ·2d
🌐NetworkProtocols
RepuNet: A Reputation System for Mitigating Malicious Clients in DFL
arxiv.orgΒ·6h
πŸ”BitFunnel
The Engineering Tradeoffs Behind HNSW-Based Vector Search
dev.toΒ·3hΒ·
Discuss: DEV
πŸ—‚οΈVector Databases
Imitation Box Horse - Personal Center Page (19)
dev.toΒ·21hΒ·
Discuss: DEV
πŸ“–Nordic Typography
Digital Privacy Everywhere
arxiv.orgΒ·2d
πŸ”Homomorphic Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap