🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ—οΈ Paleocryptography

Historical Ciphers, Medieval Encryption, Manuscript Analysis, Archaeological Cryptanalysis

Mining and Refining: Drilling and Blasting
hackaday.comΒ·4d
πŸ”Tape Forensics
A bright shiny object: Misapplication of Benford’s law published in health economics journal
statmodeling.stat.columbia.eduΒ·10h
πŸ”²Cellular Automata
Where Did CP852 Come From Again?
os2museum.comΒ·1d
🍎Apple II Heritage
BreachForums broken up? French police arrest five members of notorious cybercrime site
bitdefender.comΒ·16h
πŸ”“Hacking
Operationalizing Gartner TRiSM: Testing AI for Trust, Risk, and Security
hackerone.comΒ·1d
πŸ”Concolic Testing
Engineer Unlocks Hidden Photo in Power Mac ROM After 27 Years
digitrendz.blogΒ·23hΒ·
Discuss: Hacker News
πŸ–₯️Vintage Macintosh
New Process Uses Microbes to Create Valuable Materials from Urine
newscenter.lbl.govΒ·1dΒ·
Discuss: Hacker News
🦴Database Paleontology
Tang Nano 9K Series [tutorial]
learn.lushaylabs.comΒ·12hΒ·
Discuss: Hacker News
πŸ”FPGA Verification
How to Make a Beautiful Floral Keycap Using Resin
hackaday.comΒ·2d
⌨️Mechanical Keyboards
This daringly experimental thriller is a puzzle-lover's delight
newscientist.comΒ·3d
πŸ”“Hacking
3D-Printed Flexure Micro-Manipulator
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ”§Cassette Engineering
The Future of AI Is Physical: Simulation Is Key
inductiva.aiΒ·1dΒ·
Discuss: Hacker News
πŸ”²Cellular Automata
Team tackles support structure bottlenecks with dual-wavelength 3D printing
phys.orgΒ·8h
πŸ“„Document Digitization
Cryovolcanism and resurfacing on Pluto's largest moon, Charon
phys.orgΒ·1d
πŸ“ΈTIFF Archaeology
Adaptive Hybrid Sort: Dynamic Strategy Selection for Optimal Sorting Across Diverse Data Distributions
arxiv.orgΒ·1d
🌳Trie Structures
Navigating a Heightened Cyber Threat Landscape: Military Conflict Increases Attack Risks
tenable.comΒ·1d
πŸ›‘Cybersecurity
Cybercriminals are abusing LLMs to help them with hacking activities
techradar.comΒ·1d
πŸ”“Hacking
And Now Malware That Tells AI to Ignore It?
darkreading.comΒ·3d
πŸ”“Hacking
LapDogs: China-nexus hackers Hijack 1,000+ SOHO devices for espionage
securityaffairs.comΒ·10h
πŸ”“Hacking
First hominin fossils recovered from submerged Sundaland
phys.orgΒ·1d
🦴Database Paleontology
Loading...Loading more...
AboutBlogChangelogRoadmap