🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” PKI Archaeology

Certificate History, Trust Evolution, Cryptographic Heritage, Digital Identity

Glycol, Far UVC, and CFM Measurement at BIDA
jefftk.comΒ·2d
🧲Cassette Physics
As predicted
aardvark.co.nzΒ·1d
πŸ“°RSS Archaeology
A uniform, planned, and practiced response is the foundation of a safe school
iloveuguys.orgΒ·1dΒ·
Discuss: Hacker News
🚨Incident Response
GraphQL vs. REST: Why GraphQL Wins for Enterprise Commerce
shopify.comΒ·12hΒ·
Discuss: Hacker News
🌊Streaming Databases
Write Better with Vale
pragprog.comΒ·10hΒ·
Discuss: Hacker News
πŸ“Concrete Syntax
Show HN: My portfolio in the style of a campy early-internet Geocities site
jmkod.esΒ·2dΒ·
Discuss: Hacker News
πŸš€Indie Hacking
The npm incident frightened everyone, but ended up being nothing to fret about
cyberscoop.comΒ·10h
πŸ”“Hacking
Lessons from npm's Security Failures
oneuptime.comΒ·1dΒ·
Discuss: Hacker News, Hacker News, r/javascript, r/programming, r/typescript, r/webdev
πŸ“¦Package Managers
Targeted Attack Compromises Popular NPM Packages
decipher.scΒ·2d
πŸ”“Hacking
Permeable inspection of pharmaceuticals: Real-time tablet quality inspection system developed
phys.orgΒ·1h
πŸ“„Document Digitization
pathwaycom/llm-app
github.comΒ·2d
πŸ”„Archive Workflows
How to Get a Verified KuCoin Account in 2025 – Step-by-Step Guide
dev.toΒ·3dΒ·
Discuss: DEV
βœ…Checksum Validation
Fairness-Aware Data Augmentation for Cardiac MRI using Text-Conditioned Diffusion Models
arxiv.orgΒ·1d
πŸŒ€Riemannian Computing
Automated Vulnerability Prioritization via Semantic Similarity & Code Attribution Graph Analysis
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“Code Metrics
Autonomous Thermal Anomaly Detection via Multi-Modal Sensor Fusion and Dynamic Bayesian Networks
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“ŠHomelab Monitoring
ALLabel: Three-stage Active Learning for LLM-based Entity Recognition using Demonstration Retrieval
arxiv.orgΒ·21h
πŸ”Information Retrieval
Presence in VR should show tiny people, not user avatars
interconnected.orgΒ·12hΒ·
Discuss: Hacker News
πŸ“ŸTerminal Physics
The Hybrid Cloud Dilemma: Striking the Right Balance for Your Business
dev.toΒ·1dΒ·
Discuss: DEV
πŸ–₯️Self-hosted Infrastructure
Ransomware 2025: Infostealers on the March
reversinglabs.comΒ·1d
🦠Malware Analysis
Day 3: Unleash QuestBot's Power🎯
dev.toΒ·14hΒ·
Discuss: DEV
⚑Proof Automation
Loading...Loading more...
AboutBlogChangelogRoadmap