🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Quantum Security

Post-quantum Cryptography, Lattice Cryptography, Key Exchange, Long-term Protection

Mission and Ministry of Thought Adjusters
newenglishreview.org·14h
🎯Gradual Typing
Inflight Auctions
jefftk.com·14h
⚙️Cassette Mechanics
NFC Release 15: The what, why and how
nfc-forum.org·20h·
Discuss: Hacker News
🔌Interface Evolution
Cyber insurance premiums dropped for the first time in 2024
metacurity.com·4d
🔓Hacking
What We’ve Learned from 5 Months of Hackbot Activity
hackerone.com·3d
🔓Hacking
Jacobi Ellipsoid
en.wikipedia.org·1d·
Discuss: Hacker News
🌀Differential Geometry
Mediterranean Water Crisis: The Math Behind Why "Simple" Solutions Won't Work
fromtheprism.com·14h·
Discuss: Hacker News
📈Time Series
I will fix your vibe-coded MVP – sgnt.ai
sgnt.ai·1d·
Discuss: Hacker News
🔓Hacking
Most Advanced AI Agents Now Capable of Lying, Scheming & Threatening Their Creators: A Growing AI Safety Concern
dev.to·22h·
Discuss: DEV
🎯Threat Hunting
Password-Derived Signature Authentication
github.com·6d·
Discuss: Hacker News
🔒LDAP Security
Code Smell 305 - Null Infinity
dev.to·1d·
Discuss: DEV
📐Interval Arithmetic
Exploring High Efficiency Web Analysis Results(1751206739713600)
dev.to·13h·
Discuss: DEV
🌊Stream Processing
A new approach to probing Landauer's principle in the quantum many-body regime
phys.org·4d
⚛️Information Physics
SeaOS: Web3 as the Foundation for AI, Not Just an AI Tool
dev.to·12h·
Discuss: DEV
🌊Streaming Systems
MCP Security Vulnerabilities and Attack Vectors
dev.to·2d·
Discuss: DEV
🔐CBOR
The Furones Algorithm
dev.to·2d·
Discuss: DEV
🕸️Graph Algorithms
This Week in Security: MegaOWNed, Store Danger, and FileFix
hackaday.com·2d
🔓Hacking
Taking over millions of developers exploiting an Open VSX Registry flaw
securityaffairs.com·2d
🌐WASI
Dining across the divide: ‘I said, I’m slightly to the right of Genghis Khan. She said she was to the left of Karl Marx’
theguardian.com·16h
⭐Awesome lists
Shrinking the Generation-Verification Gap with Weak Verifiers
arxiv.org·5d
🧪CBOR Fuzzing
Loading...Loading more...
AboutBlogChangelogRoadmap