🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🇸🇪 Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

A World in the Palm of Their Hands
nordmedianetwork.org·14h
❄️Nordic Design Philosophy
Hands-on with the Level Lock Pro: sleeker, smarter, still very expensive
theverge.com·9h
🏠Home Automation
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·1d
🎯Threat Hunting
Top 10 Malware of Q2 2025: A Deep Dive into the IoCs
circleid.com·4h
🕵️Domain Enumeration
Getting a Better Handle on International Domain Names and Punycode, (Tue, Aug 26th)
isc.sans.edu·5h
📡DNS Archaeology
Chatting with Unmesh about building language with LLMs
martinfowler.com·8h
💻Programming languages
postMessaged and Compromised
msrc.microsoft.com·1d·
Discuss: Lobsters, Hacker News, r/programming
🎯NTLM Attacks
EU fertilization targets fall short of halving excess nitrogen in the soil
phys.org·4h
⚙Backus-Naur Form
Virtupace Keeps Your Data Safe in a Digital World — Over $100K Raised
dev.to·7h·
Discuss: DEV
⚖️Game Preservation Ethics
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
jacobasper.com·21h·
Discuss: Hacker News
🦀Rusty Databases
Show HN: SQLite Extensions Guide
github.com·8h·
Discuss: Hacker News
🧩SQLite Extensions
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·1d
🛡Cybersecurity
TabResFlow: A Normalizing Spline Flow Model for Probabilistic Univariate Tabular Regression
arxiv.org·18h
📊Count-Min Sketch
The Compass Pattern: How smart documentation architecture saves $0.63M annually
wyrd-technology.com·9h·
Discuss: Hacker News
📚MARC Evolution
Spoon-Bending, a logical framework for analyzing GPT-5 alignment behavior
github.com·1d·
Discuss: Hacker News
💾Binary Linguistics
A new layer of security for certified Android devices
android-developers.googleblog.com·1d·
Discuss: Hacker News, r/Android
🛡️ARM TrustZone
FRAME : Comprehensive Risk Assessment Framework for Adversarial Machine Learning Threats
arxiv.org·18h
🦠Malware Analysis
FedKLPR: Personalized Federated Learning for Person Re-Identification with Adaptive Pruning
arxiv.org·18h
🧠Machine Learning
nodeWSNsec: A hybrid metaheuristic approach for reliable security and node deployment in WSNs
arxiv.org·18h
🕸️Network Topology
Typeclassopedia
wiki.haskell.org·1d·
Discuss: Hacker News
🧬Functional Programming
Loading...Loading more...
AboutBlogChangelogRoadmap