๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” PKI Archaeology

Certificate History, Trust Evolution, Cryptographic Heritage, Digital Identity

How to create repositories in Artifactory with curl
zufallsheld.deยท11hยท
Discuss: Hacker News
๐Ÿ”ŒArchive APIs
Finish your degree!
lawrencecpaulson.github.ioยท4d
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Percona Launches First-Ever Open Source Transparent Data Encryption for Postgres
percona.comยท2dยท
Discuss: Hacker News
๐Ÿ—„๏ธPostgreSQL WAL
The Revolution Will Be Cognitive โ€“ By Caroline Orr Bueno
weaponizedspaces.substack.comยท15hยท
Discuss: Substack
๐ŸงฒMagnetic Philosophy
Recommend a key-value store
reddit.comยท21hยท
Discuss: r/rust
๐Ÿฆ€Embedded Rust
Five million years of Antarctic Circumpolar Current strength variability (2024)
nature.comยท1dยท
Discuss: Hacker News
๐ŸงŠArctic Storage
[D] NeurIPS workshops 2025?
reddit.comยท21hยท
Discuss: r/MachineLearning
๐ŸงฌCopy Number Variants
KubeCodex: GitOps Repo Structure
reddit.comยท1dยท
Discuss: r/kubernetes
๐Ÿ”“Open Source Software
Flipper Zero Episode 3: Getting Started with GPIO and 3-in-1 Board Setup
infosecwriteups.comยท1d
๐Ÿ”ŒSingle Board PC
Agentic Coding Slot Machines โ€“ Did We Just Summon a Genie Addiction? โ€“ Part 1
madhavajay.comยท2dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Bad Hair Day? Not for Product Managers
hackernoon.comยท11h
โš™๏ธTape Engineering
How to Make Better Decisions, According to a Neuroscientist
nytimes.comยท1h
๐Ÿ”ฒCellular Automata
Rare 300,000-year-old wooden tools found in China reveal diet secrets of early humans
the-independent.comยท1d
๐ŸฆดDatabase Paleontology
How I Built an AI Agent to Manage My Gmail with RunnerH
dev.toยท4hยท
Discuss: DEV
๐Ÿ”ƒFeed Algorithms
In Search of the Holy Grail
mnky9800n.substack.comยท2dยท
Discuss: Substack
๐ŸบComputational Archaeology
Machine Learning Fundamentals: classification example
dev.toยท1dยท
Discuss: DEV
๐ŸŽตAudio ML
China-linked group Houken hit French organizations using zero-days
securityaffairs.comยท2d
๐ŸŽซKerberos Exploitation
Cl0p cybercrime gang's data exfiltration tool found vulnerable to RCE attacks
theregister.comยท3d
๐Ÿ”“Hacking
Device Fingerprinting Guide: What It Is, How It Works + Examples
fingerprint.comยท3d
๐ŸŽตAudio Hashing
Scammers are once again abusing PDFs to trick victims into calling fake support numbers
techradar.comยท2d
๐ŸŽซKerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap