🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 PKI Archaeology

Certificate History, Trust Evolution, Cryptographic Heritage, Digital Identity

Fostering Collaboration Across Industry Verticals within The Open Group
blog.opengroup.org·9h
🇸🇪Nordic Standards
How Deep Research Agents Can Leak Your Data
embracethered.com·1d
🧪Protocol Fuzzing
LibreOffice Stakes Claim as Strategic Sovereignty Tool For Governments
news.slashdot.org·6h
🔓Open Source Software
Blast from the past: Facit A2400 terminal
jpmens.net·1d·
Discuss: Lobsters, Hacker News
💾vintage computing
What Is Customer Identity and Access Management (CIAM)? CIAM Explained
fusionauth.io·2d·
Discuss: Hacker News
🔐Capability Systems
Wayland Compositors – Why and How to Handle Privileged Clients (2014)
mupuf.org·1d·
Discuss: Hacker News
🔓Password Cracking
AI Hacking: How Artificial Intelligence is Redefining Cybersecurity and Ethical Hacking
dev.to·3h·
Discuss: DEV
🔓Hacking
Show HN: RAG-Guard: Zero-Trust Document AI
github.com·1d·
Discuss: Hacker News
🤖Archive Automation
Google’s URL Context Grounding: Another Nail in RAG’s Coffin?
towardsdatascience.com·9h
🌀Brotli Internals
Space rocks tell tale of shared ancient past
phys.org·6h
🏺Kerberos Archaeology
A new layer of security for certified Android devices
android-developers.googleblog.com·1d·
Discuss: Hacker News, r/Android
🛡️ARM TrustZone
A Bitcoin Core Code Analysis
binaryigor.com·1d·
Discuss: Hacker News
🧬Bitstream Evolution
Put a ring on it: a lock-free MPMC ring buffer
h4x0r.org·7h·
Discuss: Lobsters, Hacker News, r/programming
⚡Hardware Transactional Memory
The coming war on general-purpose computing (2012)
boingboing.net·8h·
Discuss: Hacker News
🧲Magnetic Philosophy
JavaScript lib for exchanging selective disclosure proofs
github.com·3d·
Discuss: Hacker News
🌳Archive Merkle Trees
Hook Version 3: The Banking Trojan with The Most Advanced Capabilities
zimperium.com·1d
🛡️ARM TrustZone
Learning ON Large Datasets Using Bit-String Trees
arxiv.org·18h
🗂️Vector Databases
Pyrat TryHackMe Walkthrough: Step-by-Step Beginner’s Guide to Easy Level CTF with Reverse Shell and…
infosecwriteups.com·1d
🔓Password Cracking
The history of digital ethics
arxiv.org·18h
⚖️Archive Ethics
The Hexagon: A Battle-Tested Blueprint for Your Event-Driven App
mina-tafreshi.medium.com·2h·
Discuss: Hacker News
🌊Streaming Systems
Loading...Loading more...
AboutBlogChangelogRoadmap