🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

Trace Every Identity Action with Teleport Identity Security
goteleport.com·4d
🔗Data Provenance
‘I nearly died after flying thousands of miles to install a power cord for the NSA’
theregister.com·19h
🔓Hacking
An engineer’s path from data loss to software preservation
softwareheritage.org·3d
🔄Archival Workflows
Silence is a Commons by Ivan Illich (1983)
davidtinapple.com·2h·
Discuss: Lobsters
🧲Magnetic Philosophy
We Built a Conspiracy Mapping Tool Inspired by the Artist Who Had the FBI Knock
whalehunting.projectbrazen.com·1d·
Discuss: Hacker News
🚀Indie Hacking
Deploy a full stack voice AI agent with Amazon Nova Sonic
aws.amazon.com·10h
🌊Streaming Systems
Hyperdimensional Connections a Lossless, Queryable Semantic Reasoning Framework
zenodo.org·21h·
Discuss: Hacker News
🗂️Vector Databases
Why 1Password hasn't released an MCP server
blog.1password.com·2d·
Discuss: Hacker News
🔌Interface Evolution
LLM Internals for Beginners
vivekkairi.com·11h·
Discuss: Hacker News
💻Local LLMs
Cisco Discloses '10' Flaw in ISE, ISE-PIC — Patch Now
darkreading.com·1d
🌐Network Security
Proof-theoretic Semantics for First-order Logic
arxiv.org·22h
🏗️Constructive Logic
Show HN: 1.5B LLM routing model that aligns to preferences, not leaderboards
huggingface.co·1d·
Discuss: Hacker News, Hacker News
📝ABNF Parsing
Chinese state-sponsored cyberattacks target Taiwan semiconductor industry — security firm says motivation of three separate campaigns 'most likely espionage'
tomshardware.com·14h
🇨🇳Chinese Computing
OPNsense 25.1.11: Last maintenance release before version 25.7
heise.de·14h
🔓Open Source Software
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.org·1d
🕵️Vector Smuggling
Machine Learning Fundamentals: dropout project
dev.to·10h·
Discuss: DEV
🌊Stream Processing
What Happens When AI Starts Writing Your APIs?
devops.com·16h
⚙️TLA+
Vintage Hardware Find Includes Time Capsule of Data
hackaday.com·1d
💾vintage computing
Google finds custom backdoor being installed on SonicWall network devices
arstechnica.com·2d·
Discuss: Hacker News
🔓Hacking
Antivirus vs Firewall: which is right for me?
techradar.com·13h
🛡️eBPF Security
Loading...Loading more...
AboutBlogChangelogRoadmap