๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿฆ  Parasitic Compression

Steganographic Storage, Hidden Archives, Covert Preservation, Data Hiding

Deep Dive: OpenAI's GPT-OSS
dev.toยท3hยท
Discuss: DEV
๐Ÿ“ŠQuantization
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comยท15h
๐Ÿ”Cryptographic Archaeology
My Zip Isn't Your Zip: Identifying and Exploiting Semantic Gaps Between Parsers
usenix.orgยท1dยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Optimizing Region of Interest Selection for Effective Embedding in Video Steganography Based on Genetic Algorithms
arxiv.orgยท3d
๐Ÿ•ต๏ธSteganographic Archives
Inheriting a hodgepodge of random old & slow drives. Need advice on the best way to manage them.
reddit.comยท15hยท
Discuss: r/homelab
๐Ÿ’ฟDisk Geometry
Weaponizing image scaling against production AI systems
blog.trailofbits.comยท1dยท
Discuss: Hacker News, r/LocalLLaMA, r/programming
๐Ÿ•ต๏ธVector Smuggling
Cracking the Density Code: Why MAF Flows Where KDE Stalls
towardsdatascience.comยท13h
๐Ÿ”—Tailscale
Tearing Apart the Undetected (OSX)Coldroot RAT
objective-see.comยท1d
๐Ÿ“ŸTerminal Forensics
The Taste of Pencils
theparisreview.orgยท16h
๐ŸงชManuscript Chemistry
Private Sovereign Clouds with Solvinity and MinIO
blog.min.ioยท14h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
A Single-Cable Solution for USB Data and Logs
hackster.ioยท23h
๐Ÿ’พFloppy Imaging
Derek Elkins: Arithmetic Functions
hedonisticlearning.comยท7h
โš”๏ธLean Theorem
Windsurf: Memory-Persistent Data Exfiltration (SpAIware Exploit)
embracethered.comยท8h
๐Ÿง Memory Forensics
Show HN: SecretMemoryLocker โ€“ Q&A-Style Archive for Your Digital Life
secretmemorylocker.comยท2dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Major raid targets counterfeit fake HDDs from Seagate, WD, and Toshiba in Malaysia, but is it too little too late?
techradar.comยท1d
๐Ÿ’ฟDAT Forensics
MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs
arxiv.orgยท1d
๐Ÿ’ปLocal LLMs
Stop Calling It OSINT
dutchosintguy.comยท21h
๐Ÿ”ŽOSINT Techniques
My A-Z toolbox: dcfldd
rubenerd.comยท7h
๐Ÿ“‹DFDL
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
hackaday.comยท16h
๐Ÿ”“Hacking
Bringing restartable sequences out of the niche
lwn.netยท1dยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Loading...Loading more...
AboutBlogChangelogRoadmap