🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Preservation Proofs

Formal Archival, Storage Verification, Media Correctness, Durability Logic

How America Wins the Invisible War
arenamag.com·17h·
Discuss: Hacker News
🇷🇺Russian Computing
60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign
socket.dev·1d·
Discuss: Hacker News
🎫Kerberos Exploitation
HTTP is not simple
daniel.haxx.se·1d·
Discuss: Lobsters, Hacker News, r/programming
🌐Web Standards
From 'reef-friendly' sunscreens to 'sustainable' super, greenwashing allegations are rife—here's how the claims stack up
phys.org·1d
🏠Homelab Preservation
Apple taught an LLM to predict tokens up to 5x faster in math and coding tasks
9to5mac.com·17h·
Discuss: Hacker News
💻Local LLMs
Vulkan 1.4.325 Released With Untyped Pointers Extension
phoronix.com·3h
🔗Static Linking
How we made JSON.stringify more than twice as fast
v8.dev·5d·
Discuss: Lobsters, Hacker News, r/javascript, r/programming, r/webdev
🌊Streaming Compression
How to Run SeaTunnel in Separated Cluster Mode on K8s
hackernoon.com·2d
📦Container Security
Prompting GPT-5 for agentic workflows and advanced coding applications
the-decoder.com·1d
⚡Proof Automation
Show HN: Grid-table – Emacs grid table with rich text, images, formulas
github.com·1h·
Discuss: Hacker News
📟Terminal Typography
When a Jira Ticket Can Steal Your Secrets
simonwillison.net·11h·
Discuss: Hacker News
🛡️WebAssembly Security
Unified data, smarter AI: how to unlock business value responsibly
techradar.com·1d
🔗Data Provenance
Extension that allows your Chrome browser to share context with LLMs
github.com·22m·
Discuss: Hacker News
🌀Brotli Internals
I dove into Go's runtime to see how channels really work under the hood — here’s what I found
reddit.com·1d·
Discuss: r/golang
🏗️Compiler Archaeology
Context Engineering — A Comprehensive Hands-On Tutorial with DSPy
towardsdatascience.com·3d
✨Effect Handlers
Driver of destruction: How a legitimate driver is being used to take down AV processes
securelist.com·3d
🛡️eBPF Security
Latent Preference Bandits
arxiv.org·1d
🎯Content Recommendation
Part 7: Interacting with ERC-721 NFTs using `web3.py`
dev.to·2d·
Discuss: DEV
📝ABNF Extensions
Calibrating Deep Neural Network using Euclidean Distance
arxiv.org·1d
📊Learned Metrics
ViFP: A Framework for Visual False Positive Detection to Enhance Reasoning Reliability in VLMs
arxiv.org·2d
👁️OCR Verification
Loading...Loading more...
AboutBlogChangelogRoadmap