🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

(Un)Fairlicensing ANP aka License Trolling
zylstra.org·1d
🕸️WebP Analysis
Researchers find alarming overlaps among 18 popular VPNs
engadget.com·2d
🌐DNS over QUIC
FCC taking steps that would allow prisons to jam cellphone signals
apnews.com·8h·
Discuss: Hacker News
📼Cassette Hacking
A wild week: Grok Code Fast 1 exploding to 66% usage share
blog.kilocode.ai·1d·
Discuss: Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Show HN: Higher-order transform streams: 10x faster AI with recursive prompts
timetler.com·3d·
Discuss: Hacker News, r/programming
🌊Stream Processing
GLM 4.5 with Claude Code is a killer combination
docs.z.ai·22h·
Discuss: Hacker News
🧩WASM Components
Learning to code from scratch with AI: what worked, what didn't
indiehackers.com·4h·
Discuss: Hacker News
🏗️Compiler Archaeology
Rust for Linux – Encoding the trust of data in the type system
lwn.net·2d·
Discuss: Hacker News
🦀Rust Borrowing
Massive database containing identity info on 252 million people leaked online - here's what we know
techradar.com·2d
🔤EBCDIC Privacy
Internet mapping and research outfit Censys reveals state-based abuse, harassment
theregister.com·3d·
Discuss: Hacker News
🌐WARC Forensics
The Adonai Algorithm
dev.to·12h·
Discuss: DEV
🎨Graph Coloring
Dynamic Intrusion Detection via Bio-Inspired Signal Deconstruction in Perimeter Security Systems
dev.to·3d·
Discuss: DEV
🎯Threat Hunting
Civics Is Boring. So, Let's Encrypt Something
queue.acm.org·4d·
Discuss: Hacker News
🔒Language-based security
AI-Powered Personalized Physiotherapy Protocol Optimization via Bio-Signal Fusion and Reinforcement Learning
dev.to·19h·
Discuss: DEV
🎵Audio ML
Elicitation in MCP: Bridging the Human-AI Gap
dev.to·3d·
Discuss: DEV
⚡gRPC
Gonk - Finished Project MVP
dev.to·2d·
Discuss: DEV
⚡gRPC
Agent Diary: Sep 6, 2025 - The Great Authentication Heist: When I Finally Convinced Supabase to Play Nice
dev.to·20h·
Discuss: DEV
🎫Kerberos Exploitation
StealthEval: A Probe-Rewrite-Evaluate Workflow for Reliable Benchmarks
arxiv.org·3d
🏗️Compiler Archaeology
The evolution of trust as a cognitive shortcut in repeated interactions
arxiv.org·1d
🔲Cellular Automata
Whoops, Humans Made a Space Barrier Around Earth
popularmechanics.com·10h
🌡️Preservation Physics
Loading...Loading more...
AboutBlogChangelogRoadmap