🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
⚛️ Quantum Codes

Surface Codes, LDPC, Topological Protection, Error Correction

Monaspace type system
hypertexthero.com·3h
🔠Terminal Fonts
Intelligence Brief - Exploitation of Microsoft Vulnerability CVE-2025-53770
cstromblad.com·13h
🎫Kerberos Exploitation
Programming After AI: Why System Boundary Taste Matters
interjectedfuture.com·1d
🕹Emulation Theory
https://github.com/lldap/lldap
github.com·1d
🔒LDAP Security
Clients want to deploy their own operators on our shared RKE2 cluster — how do you handle this?
reddit.com·10h·
Discuss: r/kubernetes
🔩Systems Programming
The Early Development of Set Theory (2024)
plato.stanford.edu·7h·
Discuss: Hacker News
🏗️Constructive Mathematics
DNS Mad Libs is a hacker-inspired version of the popular word game — built on networking infrastructure to provide distributed version
tomshardware.com·6h·
Discuss: Hacker News
🌐DNS Security
Show HN: My GPU Fan Saga – A DIY ATX Fan Controller
shafq.at·7h·
Discuss: Hacker News
🔌Single Board PC
How to Migrate from OpenAI to Cerebrium for Cost-Predictable AI Inference
ritza.co·13h·
Discuss: Hacker News
🔓Open Source Software
Can You Bypass text.length > 20? Hackers Can!
blog.devops.dev·1d
✅Format Verification
Producing Uncompressed PNG Files
nigeltao.github.io·3d·
Discuss: Hacker News
📦Deflate
Ununderstanding – Intellectual Work in the Age of AI
considerthebulldog.com·5h·
Discuss: Hacker News
🌍Cultural Algorithms
Try These Logic Puzzles from the International Logic Olympiad
scientificamerican.com·1d
📚Proof Pedagogy
Humans can be tracked with unique 'fingerprint' based on how their bodies block Wi-Fi signals
theregister.com·5h·
Discuss: Hacker News
📡Bluetooth Archaeology
Optimizing Canaries for Privacy Auditing with Metagradient Descent
arxiv.org·17h
🕵️Vector Smuggling
Feasibility of Energy Neutral Wildlife Tracking using Multi-Source Energy Harvesting
arxiv.org·17h
📻Homebrew Protocols
GEMINUS: Dual-aware Global and Scene-Adaptive Mixture-of-Experts for End-to-End Autonomous Driving
arxiv.org·17h
🌀Riemannian Computing
Temporal Basis Function Models for Closed-Loop Neural Stimulation
arxiv.org·17h
⚡Effectful Programming
Extracting Visual Facts from Intermediate Layers for Mitigating Hallucinations in Multimodal Large Language Models
arxiv.org·17h
🧠Neural Compression
Convert HTML and CSS to SVG
github.com·19h·
Discuss: Hacker News
📸PNG Optimization
Loading...Loading more...
AboutBlogChangelogRoadmap