๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ฆ Parasitic Storage
Steganographic Archives, Hidden Preservation, Covert Storage, Data Hiding
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Somatic mutation and selection at population scale
nature.com
ยท
1d
๐งฌ
Copy Number Variants
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
original โ
whynothugo.nl
ยท
21h
๐
Streaming Systems
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
How to Tame Varnish Memory Usage Safely
fastly.com
ยท
21h
๐ฏ
Performance Forensics
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Clop is a Big Fish, But Not Worth Hunting
news.risky.biz
ยท
19h
๐
Hacking
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Walrus, A 1M ops/sec, 1 GB/s Write Ahead Log in Rust
nubskr.com
ยท
2d
ยท
Discuss:
Lobsters
,
Hacker News
๐ฟ
ZFS Internals
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Hacking the Humane AI Pin
writings.agg.im
ยท
1d
ยท
Discuss:
Hacker News
๐ก๏ธ
ARM TrustZone
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Westin's Four States of Privacy
marcusolsson.dev
ยท
10h
ยท
Discuss:
Hacker News
๐
Privacy Archives
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Mathematical model of memory suggests 7 senses are optimal
skoltech.ru
ยท
3h
ยท
Discuss:
Hacker News
๐ฒ
Cellular Automata
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com
ยท
4d
ยท
Discuss:
Hacker News
๐ก๏ธ
WASM Security
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Self-Extracting F3
buttondown.com
ยท
3d
ยท
Discuss:
Hacker News
โ
Format Verification
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
1k LEDs Is No Limit
xayax.net
ยท
10h
ยท
Discuss:
Lobsters
,
Hacker News
โก
Homebrew CPUs
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Three Solutions to Nondeterminism in AI
blog.hellas.ai
ยท
1d
ยท
Discuss:
Hacker News
๐ฏ
Performance Proofs
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
TRIM: Token-wise Attention-Derived Saliency for Data-Efficient Instruction Tuning
arxiv.org
ยท
17h
๐จ
Compilers
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Show HN: Using an LLM to sensibly sort a shopping receipt
treblig.org
ยท
8h
ยท
Discuss:
Hacker News
๐
Constraint Handling
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io
ยท
3h
ยท
Discuss:
Hacker News
๐
Capability Systems
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
From Static Rate Limiting to Adaptive Traffic Management in Airbnbโs Key-Value Store
medium.com
ยท
5h
๐
Streaming Systems
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Keyboard Holders, Generation 1
cceckman.com
ยท
6h
ยท
Discuss:
Hacker News
โจ๏ธ
Mechanical Keyboards
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
ObCLIP: Oblivious CLoud-Device Hybrid Image Generation with Privacy Preservation
arxiv.org
ยท
2d
๐
Homomorphic Encryption
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.com
ยท
1d
ยท
Discuss:
Hacker News
,
r/golang
๐
Cryptographic Protocols
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Turning data into knowledge: How Huawei is upgrading storage for the AI era
techradar.com
ยท
5h
๐พ
Persistence Strategies
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Loading...
Loading more...
« Page 3
โข
Page 5 »