๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ก Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

The Razor-Thin Line Between Conspiracy Theory and Actual Conspiracy
theatlantic.comยท9h
๐ŸŒWARC Forensics
How Standard Setters Run the Internet
internetsociety.orgยท2d
๐ŸŒWeb Standards
Some Researchers Are Hiding Secret Messages in Their Papers, but They're Not Meant for Humans
smithsonianmag.comยท7h
๐Ÿ’งManuscript Watermarks
Honest Abe: Anti-BS Epistemology
austinross.xyzยท6hยท
Discuss: Hacker News
๐Ÿ”ฒProof Irrelevance
A distributed systems reliability glossary
antithesis.comยท2dยท
Discuss: Lobsters, Hacker News, r/programming
โœ…Archive Fixity
API Auth Is Deeper Than It Looks
nango.devยท1dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
After managing 50+ security breaches, I documented our incident response framework with ready to use forensic scripts
ncse.infoยท4dยท
Discuss: r/programming
๐ŸšจIncident Response
Lessons from scaling PostgreSQL queues to 100k events per second
rudderstack.comยท7hยท
Discuss: Hacker News
๐ŸงฌPostgreSQL Forensics
Triggering QUIC
blog.apnic.netยท2d
๐ŸŒDNS over QUIC
Grep a million GitHub repositories via MCP
vercel.comยท8hยท
Discuss: Hacker News
โšกProof Automation
How to protect your router from being hacked and becoming a residential proxy | Kaspersky official blog
kaspersky.comยท1d
๐Ÿ”“Hacking
Knowledge Without Power: AI, Infrastructure, and the Ethics of Design
medium.comยท7hยท
Discuss: Hacker News
โš–๏ธEmulation Ethics
Why We Develop EloqDB Mainly in C++
eloqdata.comยท7hยท
Discuss: Hacker News
๐Ÿฆ€Rust Borrowing
Cisco ISE maximum severity flaw lets hackers execute root code
techradar.comยท4h
๐Ÿ”“Hacking
Remote Code Execution Discovered in XTool AnyScan App: Risks to Phones and Vehicles
nowsecure.comยท1dยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Machine Learning Fundamentals: dropout
dev.toยท4hยท
Discuss: DEV
๐ŸŒŠStream Processing
๐Ÿ›๏ธ Using Blockchain to Anchor AI: Why Future AI Systems Require Consensus and Censorship Resistance
dev.toยท8hยท
Discuss: DEV
๐ŸคDistributed Consensus
Porting a Cross-Disciplinary Text Mining Course Online Using Innovative Engagement Techniques
hackernoon.comยท2d
๐Ÿค–Grammar Induction
Show HN: Kannel SMS gateway fork with WAP removed
sysadmin.lolยท3dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Urban Green Governance: IoT-Driven Management and Enhancement of Urban Green Spaces in Campobasso
arxiv.orgยท17h
โšกIncremental Computation
Loading...Loading more...
AboutBlogChangelogRoadmap