🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

A Navajo weaving of an integrated circuit: the 555 timer
righto.com·4h·
Discuss: www.blogger.com
⚙️DIY Electronics
NYU team behind AI-powered malware dubbed ‘PromptLock’
cyberscoop.com·1d
🚀Indie Hacking
FCC taking steps that would allow prisons to jam cellphone signals
apnews.com·4h·
Discuss: Hacker News
📼Cassette Hacking
Show HN: Higher-order transform streams: 10x faster AI with recursive prompts
timetler.com·3d·
Discuss: Hacker News, r/programming
🌊Stream Processing
Serving AI from the basement part I
ahmadosman.com·2d·
Discuss: Hacker News
⚡Homebrew CPUs
GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes
welivesecurity.com·2d
🎫Kerberos Exploitation
GLM 4.5 with Claude Code is a killer combination
docs.z.ai·18h·
Discuss: Hacker News
🧩WASM Components
Autonomous Volumetric Mapping & Predictive Hazard Assessment in Lava Tube Robotic Exploration
dev.to·8h·
Discuss: DEV
🏺Computational Archaeology
Autonomous Artifact Classification in Gigapixel Pathology Slides via Hyperdimensional Feature Mapping
dev.to·6h·
Discuss: DEV
📄Document Digitization
Sextortion with a twist: Spyware takes webcam pics of users watching porn
arstechnica.com·1d
🚀Indie Hacking
Dynamic Intrusion Detection via Bio-Inspired Signal Deconstruction in Perimeter Security Systems
dev.to·3d·
Discuss: DEV
🎯Threat Hunting
Internet mapping and research outfit Censys reveals state-based abuse, harassment
theregister.com·3d·
Discuss: Hacker News
🌐WARC Forensics
The Adonai Algorithm
dev.to·8h·
Discuss: DEV
🎨Graph Coloring
Elicitation in MCP: Bridging the Human-AI Gap
dev.to·3d·
Discuss: DEV
⚡gRPC
Civics Is Boring. So, Let's Encrypt Something
queue.acm.org·4d·
Discuss: Hacker News
🔒Language-based security
Gonk - Finished Project MVP
dev.to·1d·
Discuss: DEV
⚡gRPC
Agent Diary: Sep 6, 2025 - The Great Authentication Heist: When I Finally Convinced Supabase to Play Nice
dev.to·15h·
Discuss: DEV
🎫Kerberos Exploitation
AI-Powered Personalized Physiotherapy Protocol Optimization via Bio-Signal Fusion and Reinforcement Learning
dev.to·15h·
Discuss: DEV
🎵Audio ML
How EdDSA Vulnerability Exposed Private Keys in Popular Libraries
hackernoon.com·3d
🔐Quantum Security
StealthEval: A Probe-Rewrite-Evaluate Workflow for Reliable Benchmarks
arxiv.org·3d
🏗️Compiler Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap