🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ Privacy Archives

Homomorphic Encryption, Federated Learning, Secure Computation, Confidential Storage

Google Dorks: Unearth Valuable Information with Advanced Searches
infosecwriteups.comΒ·9h
πŸ”¬Archive Forensics
Timely Manner
nytimes.comΒ·4h
⬜Minimalism
original β†—
wingolog.orgΒ·2dΒ·
Discuss: Hacker News
πŸ”©Systems Programming
Sophos AI at Black Hat USA ’25: Anomaly detection betrayed us, so we gave it a new job
news.sophos.comΒ·1d
🎯Threat Hunting
A do-or-die moment for the scientific enterprise – Reese Richardson
reeserichardson.blogΒ·2d
πŸŽ“Academic Torrents
FreeBSD Security Advisory: Integer Overflow in libarchive
discoverbsd.comΒ·1d
πŸ”ŒOperating system internals
So you want to create a new abstraction?
simianwords.bearblog.devΒ·3hΒ·
Discuss: Hacker News
πŸ’§Liquid Types
We Are the Web (2005)
web.archive.orgΒ·1dΒ·
Discuss: Hacker News
🧲Magnetic Philosophy
Invoking Gemini for Workspace Agents with a Simple Google Calendar Invite
safebreach.comΒ·1dΒ·
Discuss: Hacker News
🎯Threat Hunting
Software books I wish I could read
buttondown.comΒ·3dΒ·
Discuss: Hacker News
πŸ”„Language Evolution
Security is sleeping on the job!
i.redd.itΒ·13hΒ·
Discuss: r/homelab
πŸ”“Hacking
Nascent RNA profiling uncovers molecular drivers of cellular differentiation
phys.orgΒ·1d
🧬Copy Number Variants
Bytedance shows off diffusion code model that's up to 5.4 times faster than previous models
the-decoder.comΒ·6h
🧬Bitstream Evolution
Getting Good Results from Claude Code
dzombak.comΒ·1dΒ·
Discuss: Hacker News
βš”οΈLean Tactics
MoBE: Mixture-of-Basis-Experts for Compressing MoE-based LLMs
arxiv.orgΒ·1d
πŸ’»Local LLMs
Machine Learning Fundamentals: model overfitting example
dev.toΒ·1dΒ·
Discuss: DEV
🧠Machine Learning
CISA orders agencies to deal with Microsoft Exchange fixes by Monday
metacurity.comΒ·1d
🚨Incident Response
Blockchain-Driven Transparent Governance: Enhancing Accountability via Decentralized Audit Trails & AI-Powered Anomaly Detection
dev.toΒ·23hΒ·
Discuss: DEV
🀝Distributed Consensus
Modeling roles and trade-offs in multiplex networks
arxiv.orgΒ·1d
πŸ•ΈοΈNetwork Topology
TeaOnHer, the male version of Tea, is leaking personal information on its users too
malwarebytes.comΒ·2d
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap