🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 PKI Archaeology

Certificate History, Trust Evolution, Cryptographic Heritage, Digital Identity

Fostering Collaboration Across Industry Verticals within The Open Group
blog.opengroup.org·6h
🇸🇪Nordic Standards
How Deep Research Agents Can Leak Your Data
embracethered.com·1d
🧪Protocol Fuzzing
Anchorage Digital Ventures: The First Institutional Edge for Protocols
anchorage.com·1d·
Discuss: Hacker News
🔌Interface Evolution
Which is the stronger password? g72$l#pT9a or –.COW
ianmccloy.com·1d·
Discuss: Hacker News
🔓Password Cracking
Put a ring on it: a lock-free MPMC ring buffer
h4x0r.org·4h·
Discuss: Lobsters, Hacker News, r/programming
⚡Hardware Transactional Memory
A new layer of security for certified Android devices
android-developers.googleblog.com·1d·
Discuss: Hacker News, r/Android
🛡️ARM TrustZone
Blast from the past: Facit A2400 terminal
jpmens.net·21h·
Discuss: Lobsters, Hacker News
💾vintage computing
Securing Kubernetes Layer by Layer: An OSI Approach
reddit.com·21h·
Discuss: r/kubernetes
📦Container Security
ZipLine Campaign: Advanced Social Engineering Phishing Targets U.S. Manufacturing
blog.checkpoint.com·6h
💣ZIP Vulnerabilities
Probabilistic Classification of Near-Surface Shallow-Water Sediments using A Portable Free-Fall Penetrometer
arxiv.org·15h
🔍Vector Forensics
What Is Customer Identity and Access Management (CIAM)? CIAM Explained
fusionauth.io·2d·
Discuss: Hacker News
🔐Capability Systems
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.com·1d·
Discuss: Hacker News
🎫Kerberos Attacks
Multigres Architecture Overview
multigres.com·20h·
Discuss: Hacker News
🗄️Database Sharding
Route-and-Execute: Auditable Model-Card Matching and Specialty-Level Deployment
arxiv.org·15h
🦋Format Metamorphosis
Wayland Compositors – Why and How to Handle Privileged Clients (2014)
mupuf.org·1d·
Discuss: Hacker News
🔓Password Cracking
A Bitcoin Core Code Analysis
binaryigor.com·1d·
Discuss: Hacker News
🧬Bitstream Evolution
Show HN: DataCompose – Prevent downstream data failures with composite functions
datacompose.io·23h·
Discuss: Hacker News
✅Format Validation
Show HN: RAG-Guard: Zero-Trust Document AI
github.com·21h·
Discuss: Hacker News
🤖Archive Automation
Google’s URL Context Grounding: Another Nail in RAG’s Coffin?
towardsdatascience.com·6h
🌀Brotli Internals
The Future of Security with AI Document Verification
dev.to·1d·
Discuss: DEV
🔍Vector Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap