🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Preservation Proofs

Formal Archival, Storage Verification, Media Correctness, Durability Logic

Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.com·23h
🔍NTLM Forensics
Small language model for secrets detection
wiz.io·3d·
Discuss: Hacker News
💻Local LLMs
Observability in the Age of AI
blog.buildrappo.com·3h·
Discuss: Hacker News
👁️System Observability
Flame Graph Performance Truth Analysis(1750918443851900)
dev.to·1h·
Discuss: DEV
⚡Performance Tools
First NetHack ascension, and insights into the AI capabilities it requires
mikaelhenaff.substack.com·47m·
Discuss: Substack
🔲Cellular Automata
The collective waste caused by poor documentation
shanrauf.com·1d·
Discuss: Hacker News
📦Deflate
Memory Safety in Web Rust System Zero Cost Secure(1750671065382000)
dev.to·2d·
Discuss: DEV
🦀Rust Borrowing
How to Make Large-Scale Experiments Smarter and Cheaper with AI-Driven Proofs
dev.to·17h·
Discuss: DEV
✓Automated Theorem Proving
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.com·16h·
Discuss: Substack
🦀Rust Macros
Architecture Overview and Deployment of OpenShift Data Foundation Using Internal Mode
dev.to·23h·
Discuss: DEV
🗄️Database Internals
bootc-image-builder: Build your entire OS from a Containerfile
github.com·1d·
Discuss: Hacker News
🔌Operating system internals
How Not to Get Lost in PCI DSS Standards — A Tech Team’s Perspective
hackernoon.com·1d
🔗Data Provenance
AI’s Impact on Secure DevOps and the Future of Secure Software Development
devops.com·21h
🔐Capability Systems
Agentic Workflows Are Just Code – Treat Them That Way
restate.dev·1d·
Discuss: Hacker News
⚙️TLA+
From Zero to One: A Complete Guide to Implementing WeChat Sharing in HarmonyOS
dev.to·23h·
Discuss: DEV
⚡Modern Compression
Deep Dive into Databend UDF, implementing your data solutions with python, WASM and beyond
dev.to·12h·
Discuss: DEV
📋DFDL
Machine Learning Fundamentals: accuracy with python
dev.to·1d·
Discuss: DEV
👁️Observatory Systems
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.to·1d·
Discuss: DEV
🎵Spectral Hashing
The Cost of AI-Generated Code: Detection vs. Remediation
rsolv.dev·6h·
Discuss: Hacker News
📏Code Metrics
Memory Safety in Web Rust System Zero Cost Secure(1750632264828500)
dev.to·3d·
Discuss: DEV
🦀Rust Borrowing
Loading...Loading more...
AboutBlogChangelogRoadmap