๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Quantum Security

Post-quantum Cryptography, Lattice Cryptography, Key Exchange, Long-term Protection

Redudant power supply for home servers and devices
wtarreau.blogspot.comยท14hยท
Discuss: wtarreau.blogspot.com
โš™๏ธDIY Electronics
Research Worth Reading Week 32/2025
pentesterlab.comยท8h
๐Ÿ”“Hacking
Looking for Suggestions on Home Server for running Game Servers
reddit.comยท8hยท
Discuss: r/homelab
๐Ÿฆ€Embedded Rust
Was the George Foreman Grill The Best Invention of the last 50 Years?
blog.computationalcomplexity.orgยท1dยท
Discuss: blog.computationalcomplexity.org
โš—๏ธEastern Computing
AI devours your information: It knows what you search for, do and upload โ€” and uses that data
english.elpais.comยท1d
๐Ÿ”’Privacy Preserving
โ€˜The Immutable Laws of Securityโ€™ at 25: 5 corollaries for a new era
reversinglabs.comยท4d
๐Ÿ”’WASM Capabilities
Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses
tenable.comยท2d
๐Ÿ”“Hacking
The end of an era: Properly formated IP addresses in all of our data., (Sun, Aug 24th)
isc.sans.eduยท13h
๐Ÿ“กBGP Archaeology
An inner-speech decoder reveals some mental privacy issues
arstechnica.comยท1dยท
Discuss: Hacker News
๐ŸŽงLearned Audio
Ask HN: What's Hacker News's vision for the future?
news.ycombinator.comยท2dยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
Writing Speed-of-Light Flash Attention for 5090 in CUDA C++
gau-nernst.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธTerminal Renaissance
What If the Big Bang Wasnโ€™t the Beginning? Supercomputers Search for Clues
scitechdaily.comยท10h
โฐTime Crystals
Data Science Path: Automatic Subclass Registration & Python Encryption Algorithms with LabEx
dev.toยท2dยท
Discuss: DEV
๐Ÿ”Cryptographic Archaeology
Gravimetric Anomaly Mapping for Subterranean Cave Network Characterization via Quantum Sensor Arrays
dev.toยท2dยท
Discuss: DEV
โš›๏ธQuantum Tape
Is a new privacy protocol helping malicious actors more than Internet users?
techradar.comยท3d
๐Ÿ”Homomorphic Encryption
Step-by-Step Guide to Getting a Verified AdvCash Account (2026โ€“2028)
dev.toยท15hยท
Discuss: DEV
โœ…Checksum Validation
LLMs and the Russellian Inversion
philosophicalhacker.comยท1dยท
Discuss: Hacker News
๐Ÿ’ปProgramming languages
Blockchain Wants to Be the Dealer in Your Next Game of Poker
hackernoon.comยท4d
๐Ÿ”—Hash Chains
AI-Driven Fragment-Based Virtual Screening for Targeted Protein Degradation
dev.toยท23hยท
Discuss: DEV
๐Ÿ”Vector Forensics
LLMs are NOT Turing Complete (at train time), we need "train time recurrence"
fchaubard.github.ioยท2dยท
Discuss: Hacker News
๐Ÿ“ผTape Combinators
Loading...Loading more...
AboutBlogChangelogRoadmap