๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ—๏ธ Paleocryptography

Historical Ciphers, Medieval Encryption, Manuscript Analysis, Archaeological Cryptanalysis

AmigaGuide Reference Library
markround.comยท10h
๐Ÿ–ฅ๏ธVintage Macintosh
Counting Digits Quickly
jcarroll.com.auยท1d
๐Ÿ”—Concatenative Languages
The language learning "Delta" Anki card pattern
hiandrewquinn.github.ioยท2d
๐Ÿ“Concrete Syntax
Living, breathing buildings: 3D-printed material that eats COโ‚‚
cosmosmagazine.comยท21hยท
Discuss: Hacker News
๐ŸงŠArctic Storage
How Was the Wheel Invented? Computer Simulations Reveal Its Unlikely Birth Nearly 6,000 Years Ago
singularityhub.comยท2dยท
Discuss: Hacker News
๐ŸฆดDatabase Paleontology
New "Smart Capsule" to Study the Health of the GI Tract
caltech.eduยท5hยท
Discuss: Hacker News
๐Ÿ“ฆMETS Packaging
Signal President Meredith Whittaker Took on Signal-Gate
time.comยท5hยท
Discuss: Hacker News
๐Ÿ•ณ๏ธInformation Leakage
Tool Calling with Local LLMs: A Practical Evaluation
docker.comยท5hยท
Discuss: Hacker News
โšกSMT Applications
MTTR: Bullshit Masquerading as Operational Efficiency
medium.comยท13hยท
Discuss: Hacker News
๐Ÿ‘๏ธObservatory Systems
Show HN: Escape Rope โ€“ an open-source, self-hosted Tinder clone for jobs
news.ycombinator.comยท22hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
I built a label-aware PostgreSQL proxy for Kubernetes โ€“ supports TLS, pooling, dynamic service discovery (feedback + contributors welcome!)
reddit.comยท5hยท
Discuss: r/kubernetes
๐Ÿ“ฆContainer Security
The Base Rate Fallacy: Why Your Smartest Model Still Gets It Wrong
hackernoon.comยท17h
๐ŸŽฏArithmetic Coding Theory
Scientists look to black holes to know exactly where we are in the Universe. But phones and Wi-Fi are blocking the view
phys.orgยท4h
โš›๏ธQuantum Tape
Feature Engineering Pipelines That Don't Break: A Practical Guide
dev.toยท2dยท
Discuss: DEV
โœ…Format Verification
Scattered Spider crime spree takes flight as focus turns to aviation sector
theregister.comยท1h
๐Ÿ›กCybersecurity
Machine Learning Fundamentals: anomaly detection example
dev.toยท2dยท
Discuss: DEV
๐Ÿ‘๏ธObservatory Systems
Deception Detection in Dyadic Exchanges Using Multimodal Machine Learning: A Study on a Swedish Cohort
arxiv.orgยท3d
๐Ÿง Machine Learning
I Built a Simple SQL Injection Test Tool (and Broke My Own Site in the Process ๐Ÿ˜…)
dev.toยท1dยท
Discuss: DEV
๐Ÿ›Fuzzing
Machine Learning Fundamentals: autoencoder with python
dev.toยท1hยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
Balancing Privacy and Utility in Correlated Data: A Study of Bayesian Differential Privacy
arxiv.orgยท3d
๐Ÿ›ก๏ธDifferential Privacy
Loading...Loading more...
AboutBlogChangelogRoadmap