🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

The Jeffrey Epstein cover-up is an affront to US democracy | Rebecca Solnit
theguardian.com·1h
🧲Magnetic Philosophy
NYU team behind AI-powered malware dubbed ‘PromptLock’
cyberscoop.com·19h
🚀Indie Hacking
Picking up sticks.
drwho.virtadpt.net·1d
💾Persistence Strategies
Generate but verify: Reconciling the evidence utility of chatbots in many settings with chatbots’ evident lack of understanding
statmodeling.stat.columbia.edu·22h
⚡Proof Automation
Chrome Intent to Prototype: Email Verification Protocol
groups.google.com·9h·
Discuss: Hacker News
🌐Web Standards
Faux Potentiometers Use Magnets, No Contacts
hackaday.com·3h
⚙️DIY Electronics
Show HN: Higher-order transform streams: 10x faster AI with recursive prompts
timetler.com·2d·
Discuss: Hacker News, r/programming
🌊Stream Processing
Signals and Threads – Why ML Needs a New Programming Language
signalsandthreads.com·1d·
Discuss: Lobsters, Hacker News, Hacker News, r/programming
🔩Systems Programming
Autonomous Volumetric Mapping & Predictive Hazard Assessment in Lava Tube Robotic Exploration
dev.to·42m·
Discuss: DEV
🏺Computational Archaeology
Massive database containing identity info on 252 million people leaked online - here's what we know
techradar.com·1d
🔤EBCDIC Privacy
Flawless Contracts: AI-Powered Code Generation for Blockchain Security
dev.to·1d·
Discuss: DEV
⚡Proof Automation
Internet mapping and research outfit Censys reveals state-based abuse, harassment
theregister.com·3d·
Discuss: Hacker News
🌐WARC Forensics
Sextortion with a twist: Spyware takes webcam pics of users watching porn
arstechnica.com·1d
🚀Indie Hacking
Dynamic Intrusion Detection via Bio-Inspired Signal Deconstruction in Perimeter Security Systems
dev.to·3d·
Discuss: DEV
🎯Threat Hunting
Civics Is Boring. So, Let's Encrypt Something
queue.acm.org·3d·
Discuss: Hacker News
🔒Language-based security
Elicitation in MCP: Bridging the Human-AI Gap
dev.to·2d·
Discuss: DEV
⚡gRPC
DDoS is the neglected cybercrime that's getting bigger. Let's kill it off
theregister.com·5d·
Discuss: Hacker News, Hacker News
🔓Hacking
Gonk - Finished Project MVP
dev.to·1d·
Discuss: DEV
⚡gRPC
Agent Diary: Sep 6, 2025 - The Great Authentication Heist: When I Finally Convinced Supabase to Play Nice
dev.to·8h·
Discuss: DEV
🎫Kerberos Exploitation
StealthEval: A Probe-Rewrite-Evaluate Workflow for Reliable Benchmarks
arxiv.org·3d
🏗️Compiler Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap