🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Preservation Logic

Formal Archival, Storage Proofs, Media Verification, Durability Models

Obfuscated Quantum and Post-Quantum Cryptography
arxiv.org·1d
🔐Quantum Security
Service Model (Book) System Design for Task Management
varunmehta.github.io·22h·
Discuss: Hacker News
⚙️TLA+
Swift for the Web
nicksloan.com·12h·
Discuss: Hacker News
🔬Refinement Types
MLS: The Naked King of End-to-End Encryption
poberezkin.com·16h·
Discuss: Hacker News
🔐Archive Encryption
Get Org.apache.xml.security Working with GraalVM
guust.ysebie.be·1h·
Discuss: Hacker News
🛡️WebAssembly Security
Fabricated data in posts.xml for multiple/all data dumps
meta.stackexchange.com·12h·
Discuss: Hacker News
📰RSS Archaeology
Learning Generalizable and Efficient Image Watermarking via Hierarchical Two-Stage Optimization
arxiv.org·10h
💧Digital Watermarking
Quantum Inspired Legal Tech Environmental Integration for Emergency Pharmaceutical Logistics with Entropy Modulated Collapse and Multilevel Governance
arxiv.org·10h
🔐Quantum Security
Evaluating Document Extraction Accuracy
runpulse.com·20h·
Discuss: Hacker News
📋Document Layout
Linux Security Hardening and Other Tweaks
vez.mrsk.me·1h·
Discuss: Hacker News
🔌Operating system internals
The Equality Delete Problem in Apache Iceberg
blog.dataengineerthings.org·19h·
Discuss: Hacker News
🗄️PostgreSQL WAL
In-depth analysis on Valorant's Guarded Regions
reversing.info·15h·
Discuss: Hacker News
🖥️Terminal Renaissance
Automated Regulatory Compliance Verification for Radiological Safety Protocols via Bayesian Network Optimization
dev.to·11h·
Discuss: DEV
✅Format Verification
How we made our streaming joins 50% faster
blog.epsiolabs.com·5h·
Discuss: Hacker News
🧬PostgreSQL Forensics
Should We Never Use Non-Logical Properties?
meiert.com·23h·
Discuss: Hacker News
📏Linear Logic
Verification Method for Graph Isomorphism Criteria
arxiv.org·1d
🔗Graph Isomorphism
AI-Powered Predictive Maintenance for Intermodal Container Logistics Using Hybrid Bayesian Networks
dev.to·14h·
Discuss: DEV
🧮Kolmogorov Bounds
Securing Meta's Production PKI Credentials
usenix.org·7h
🎯NTLM Attacks
Show HN: Griddle – a daily logical deduction puzzle
dailygriddle.com·1d·
Discuss: Hacker News
⚡Proof Automation
DoubleAgents: Fine-Tuning LLMs for Covert Malicious Tool Calls
pub.aimind.so·50m·
Discuss: Hacker News
💻Local LLMs
Loading...Loading more...
AboutBlogChangelogRoadmap