🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Parasitic Storage

Steganographic Archives, Hidden Preservation, Covert Storage, Data Hiding

How to prepare for a Mac device security audit
jamf.com·1d
🔗Data Provenance
GitHub - onthegomap/planetiler: Flexible tool to build planet-scale vector tilesets from OpenStreetMap data fast
github.com·1d
🧬Bitstream Evolution
Capturing the Invisible Art of Scientific Practice
blog.cultivarium.org·1d·
Discuss: Hacker News
🔄Archival Workflows
Building Telemetry Pipelines with the OpenTelemetry Collector
dash0.com·2d·
Discuss: Hacker News, r/programming
🌊Stream Processing
Interfaces That Augment or Replace?
zehfernandes.com·2d·
Discuss: Hacker News
📟CLI Design
Throughput Upgrade (With Train Illustrations)
blog.healthchecks.io·1d·
Discuss: Hacker News
🌊Stream Processing
US nuclear weapons agency breached using Microsoft SharePoint hack
engadget.com·2d
🔓Hacking
Hippocampal representations drift in stable multisensory environments
nature.com·2d
📊Learned Metrics
New AMD Linux Driver Ushers In Seamless Firmware Servicing "SFS"
phoronix.com·1d
🔐HSM Integration
From Rules to Relationships: How Machines Are Learning to Understand Each Other
towardsdatascience.com·3d
🧠Machine Learning
Microsoft-owned GitHub: Open source needs funding. Ya think?
theregister.com·1d·
Discuss: Hacker News
🔓Open Source Software
Closing the complexity gap of the double distance problem
arxiv.org·3d
🧮Kolmogorov Complexity
Security by Design — UX and AI in Modern Cybersecurity
paloaltonetworks.com·1d
📟CLI Design
Dell Breached by Extortion Group, Says Data Stolen Was 'Fake'
darkreading.com·3d
🔓Hacking
Make Your Videos Stand Out: The Power of AI Video Silence Remover
dev.to·21h·
Discuss: DEV
🎧Audio Restoration
Build an intelligent eDiscovery solution using Amazon Bedrock Agents
aws.amazon.com·15h
🔄Document Workflows
Self-Contradiction as Self-Improvement: Mitigating the Generation-Understanding Gap in MLLMs
arxiv.org·3d
💻Local LLMs
Talking Like a Phisher: LLM-Based Attacks on Voice Phishing Classifiers
arxiv.org·3d
💻Local LLMs
The Dangers of Vibe Coding Part 1: Premature Optimization
dev.to·2d·
Discuss: DEV
⚡Effectful Programming
100% AI-built WebDAV client streams 100 GB text, greps in seconds
github.com·2d·
Discuss: Hacker News
🎬WebCodecs
Loading...Loading more...
AboutBlogChangelogRoadmap