🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” PAKE Protocols

Password Authentication, Zero Knowledge, Secure Login, Cryptographic Exchange

LoRaSense Pi Hat aims to Kick Start IoT Projects
hackaday.comΒ·1d
🏠Home Automation
Ada on RP2350
synack.meΒ·1d
🎯Emulation Accuracy
New Method Is the Fastest Way To Find the Best Routes
quantamagazine.orgΒ·19hΒ·
Discuss: Lobsters, Hacker News
πŸ•ΈοΈNetwork Topology
How to interactively debug GitHub Actions with netcat
jacobtomlinson.devΒ·15hΒ·
Discuss: Hacker News
βœ…Shell Verification
curl | sudo bash isn't a security issue (on Linux)
yawn.ioΒ·23hΒ·
Discuss: Hacker News
πŸ›‘οΈCLI Security
Empowering cybersecurity product managers with LangChain
datasciencecentral.comΒ·1d
πŸ”Capability Systems
Opportunity to work with the kernel filesystem, as the maintainer calls for assistance. EXT4 BUG converted to feature
lore.kernel.orgΒ·11hΒ·
Discuss: r/linux
πŸ”ŒOperating system internals
YC Startups Use AI: Agents, OCR, and Prompt Engineering with Mercoa (YC W23)
aiengineering.reportΒ·17hΒ·
Discuss: Hacker News
⚑Proof Automation
PKSS-Align: Robust Point Cloud Registration on Pre-Kendall Shape Space
arxiv.orgΒ·5h
πŸ•³οΈPersistent Homology
Inequality in the Age of Pseudonymity
arxiv.orgΒ·5h
πŸ›Digital humanities
The Future of Quantum Key Distribution and Global Secure Communications
luciuswayne.comΒ·3dΒ·
Discuss: Hacker News
πŸ”Quantum Security
Hacker summer camp: What to expect from BSides, Black Hat, and DEF CON
theregister.comΒ·1d
🎯Threat Hunting
How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments
securityaffairs.comΒ·2h
πŸ’ΎPersistence Strategies
It really is your last chance! Our exclusive NordVPN deal ends in 7 days – grab it while you still can
techradar.comΒ·1d
πŸ“žWebRTC
Reinforcement Learning for Target Zone Blood Glucose Control
arxiv.orgΒ·5h
πŸ”²Cellular Automata
SonicWall investigates possible zero-day amid Akira ransomware surge
securityaffairs.comΒ·2d
πŸ”“Hacking
How we built our own MCP server in 4 simple steps
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“»Homebrew Protocols
Iggy: Building with Bolt - WLH Challenge
dev.toΒ·16hΒ·
Discuss: DEV
πŸŒ€Brotli Internals
Six Guidelines for Trustworthy, Ethical and Responsible Automation Design
arxiv.orgΒ·2d
🏠Home Automation
A Foundation Model for DAS Signal Recognition and Visual Prompt Tuning of the Pre-trained Model for Downstream Tasks
arxiv.orgΒ·5h
πŸŒ€Differential Geometry
Loading...Loading more...
AboutBlogChangelogRoadmap