🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🇸🇪 Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

European Cybersecurity Leader Heimdal Partners with Montreal’s Fusion Cyber Group for Canadian Market Expansion
heimdalsecurity.com·1d
🎯Threat Hunting
[$] Libxml2's "no security embargoes" policy
lwn.net·1d
🔓Free and open source
The Architectural Hostility of Doorknobs
sightlessscribbles.com·2h·
Discuss: Hacker News
⬜Minimalism
Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
socket.dev·1d·
Discuss: Hacker News
🚀Indie Hacking
AES and Symmetric Key Encryption: The Key to Reliable Data Security
dev.to·3d·
Discuss: DEV
🔐Cryptographic Archaeology
Add Single-sign-on To Your Applications With Keycloak and Learn... Takashi Norimatsu & Marek Posolda
youtube.com·3h
🔓Open Source Software
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.to·1d·
Discuss: DEV
🔒WASM Capabilities
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.org·20h
📃Manuscript Tokenization
LayerZero
arxiv.org·2d
🌐NetworkProtocols
Here is a creative heading for the blog post: "The Phantom Hackers: Unmasking the Invisible Foes of
dev.to·7h·
Discuss: DEV
🛡Cybersecurity
RepuNet: A Reputation System for Mitigating Malicious Clients in DFL
arxiv.org·20h
🔍BitFunnel
Encrypt & Decrypt Text Securely in the Browser
dev.to·20h·
Discuss: DEV
🛡️WASM Security
The Year of Quantum: From concept to reality in 2025
mckinsey.com·6h·
Discuss: Hacker News
⚛️Quantum Tape
The Engineering Tradeoffs Behind HNSW-Based Vector Search
dev.to·18h·
Discuss: DEV
🗂️Vector Databases
Streamlined Baremetal Deployment: A Journey of Custom Controll... Mitsuhiro Tanino & Masanori Kuroha
youtube.com·3h
🖥️Self-hosted Infrastructure
Digital Privacy Everywhere
arxiv.org·2d
🔐Homomorphic Encryption
Excalidraw+ Is Now SoC 2 Certified
plus.excalidraw.com·2d·
Discuss: Hacker News
🔐PKI Archaeology
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
blog.checkpoint.com·11h
🎯Threat Hunting
Sony tests beta version for image authentication
heise.de·8h
👁️OCR Verification
Floating-Point Data Transformation for Lossless Compression
arxiv.org·2d
🌊Streaming Compression
Loading...Loading more...
AboutBlogChangelogRoadmap