๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” PKI Archaeology

Certificate History, Trust Evolution, Cryptographic Heritage, Digital Identity

A Recap From This Yearโ€™s Dangremond Museum Studies Interns
connecticutmuseum.orgยท2d
๐ŸบComputational Archaeology
Data Recovery Tools Request from Nigeria
dolphindatalab.comยท14h
๐ŸŽฎCartridge Archaeology
Understanding OAuth Web Server Flow: A Beer Garden Analogy
stevetecharc.comยท1d
๐Ÿ”Capability Systems
Show HN: BYO-database website analytics built for indie hackers
berrylog.appยท5hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)
isc.sans.eduยท12h
๐Ÿ›ก๏ธCLI Security
College students are bombarded by misinformation, so this professor taught them fact-checking 101
phys.orgยท1d
๐Ÿ“ฐContent Curation
Google Will Make All Android App Developers Verify Their Identity Starting Next Year
wired.comยท20h
๐Ÿ›ก๏ธARM TrustZone
NEWS ROUNDUP โ€“ 27th August 2025
digitalforensicsmagazine.comยท3h
๐ŸŒDNS Security
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation
arxiv.orgยท14h
๐Ÿ”’Language-based security
Learning ON Large Datasets Using Bit-String Trees
arxiv.orgยท1d
๐Ÿ—‚๏ธVector Databases
Classic Psion fan releases proof-of-concept language server for OPL
theregister.comยท2h
๐Ÿ•น๏ธRetro Gaming
The today and tomorrow of digital asset management
the-independent.comยท3h
๐Ÿ“„Document Digitization
Your First AI Agent: A Clear, Practical Path
dev.toยท4hยท
Discuss: DEV
โšกProof Automation
Regulatory compliance: Act now
techradar.comยท7h
๐ŸŽฏThreat Hunting
OODA Loops and Git Worktrees: 9 Tactical Lessons from AI-Augmented Development
sobu1.substack.comยท1hยท
Discuss: Substack
๐Ÿ—๏ธCompiler Archaeology
A new layer of security for certified Android devices
android-developers.googleblog.comยท2dยท
Discuss: Hacker News, r/Android
๐Ÿ›ก๏ธARM TrustZone
Purchase a GitHub Account with an Organization Attached | Aged.
dev.toยท1dยท
Discuss: DEV
๐Ÿ“ฆContent Addressable
The Humble Office Printer Could Take Down Your Network (Here's How to Prevent It)
hackernoon.comยท11h
๐Ÿ’ฃZIP Vulnerabilities
The Adaptive Communication Framework (ACF) for Extraterrestrial Intelligence Discovery
arxiv.orgยท14h
๐Ÿ“ฐRSS Archaeology
Hacker says they were able to download data on all 270,000 Intel employees - from an internal site
techradar.comยท15h
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap