๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ก Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

How Standard Setters Run the Internet
internetsociety.orgยท2d
๐ŸŒWeb Standards
AFRINIC’s Election Crisis Exposes Why RIR Oversight Must Evolve
circleid.comยท15h
๐ŸŒDNS over QUIC
Musings of a Trust Architect: When Technical Standards Meet Geopolitical Reality
lifewithalacrity.comยท2d
๐ŸคDistributed Consensus
Honest Abe: Anti-BS Epistemology
austinross.xyzยท1hยท
Discuss: Hacker News
๐Ÿ”ฒProof Irrelevance
๐Ÿ” Introducing EMCL โ€“ A Secure Protocol for AI Agents to Call Tools
dev.toยท2dยท
Discuss: DEV
๐ŸŒNetworkProtocols
Tracking Protestware Spread: 28 npm Packages Affected by Payload Targeting Russian-Language Users
socket.devยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Reversing Google's New VM-Based Integrity Protection: PairIP
blog.byterialab.comยท1dยท
Discuss: Hacker News
๐ŸŒWASI
Regex Is a 70-Year-Old Dinosaurโ€”Hereโ€™s the Modern Alternative
hackernoon.comยท9h
๐Ÿ”RegEx Engines
Crawling a billion web pages in just over 24 hours, in 2025
andrewkchan.devยท1dยท
Discuss: Hacker News, r/programming
โšกRedis Internals
Wi-Fi: Twenty-Five Years and Counting
arxiv.orgยท2d
๐Ÿ“กNetwork Archaeology
A distributed systems reliability glossary
antithesis.comยท2dยท
Discuss: Lobsters, Hacker News, r/programming
โœ…Archive Fixity
After managing 50+ security breaches, I documented our incident response framework with ready to use forensic scripts
ncse.infoยท4dยท
Discuss: r/programming
๐ŸšจIncident Response
Lessons from scaling PostgreSQL queues to 100k events per second
rudderstack.comยท2hยท
Discuss: Hacker News
๐ŸงฌPostgreSQL Forensics
Triggering QUIC
blog.apnic.netยท2d
๐ŸŒDNS over QUIC
How to protect your router from being hacked and becoming a residential proxy | Kaspersky official blog
kaspersky.comยท1d
๐Ÿ”“Hacking
Knowledge Without Power: AI, Infrastructure, and the Ethics of Design
medium.comยท2hยท
Discuss: Hacker News
โš–๏ธEmulation Ethics
Why We Develop EloqDB Mainly in C++
eloqdata.comยท2hยท
Discuss: Hacker News
๐Ÿฆ€Rust Borrowing
Opening a Six-Lock Safe With One Key Using Brunnian Links
hackaday.comยท17h
๐Ÿ”“Password Cracking
Remote Code Execution Discovered in XTool AnyScan App: Risks to Phones and Vehicles
nowsecure.comยท1dยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
The FCC wants to ban Chinese tech from the undersea cables that connect the U.S. to the rest of the world โ€” proposed new rules would 'secure cables against fore...
tomshardware.comยท1h
๐Ÿ›กCybersecurity
Loading...Loading more...
AboutBlogChangelogRoadmap