๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” RISC-V Cryptography

Hardware Security Extensions, Vector Cryptography, Open Security Architecture

My A-Z toolbox: dcfldd
rubenerd.comยท18h
๐Ÿ“‹DFDL
Anonymizing Linux: Tails 6.19 and 7.0rc2 update packages
heise.deยท22h
๐Ÿ”ŒOperating system internals
Two quantum computers with 20 qubits manage to simulate information scrambling
phys.orgยท1d
โš›๏ธQuantum Tape
Optimizing multiprecision LLL in FLINT
fredrikj.netยท2d
๐ŸงฎAlgebraic Datatypes
Data Science Path: Automatic Subclass Registration & Python Encryption Algorithms with LabEx
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Cryptographic Archaeology
Kubernetes v1.34 is coming with some interesting security changes โ€” what do you think will have the biggest impact?
armosec.ioยท22h
๐Ÿ“ฆContainer Security
Bringing restartable sequences out of the niche
lwn.netยท1dยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Quantifying Thermal Gradient Impact on 40-Layer Stack Die Reliability through Bayesian Network Analysis
dev.toยท1dยท
Discuss: DEV
โš™๏ธModern Assembly
RK3588 AI Module7
crowdsupply.comยท1dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธModern Terminals
A Magnetized Needle and a Steady Hand (2016)
nullprogram.comยท3dยท
Discuss: Hacker News
๐Ÿ”งRISC-V Assembler
JavaScript lib for exchanging selective disclosure proofs
github.comยท58mยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Building a Computer in the 90s (2019)
dfarq.homeip.netยท8hยท
Discuss: Hacker News
๐ŸŽApple Computing
The Supply Chain Paradox: When โ€œHardenedโ€ Images Become a Vendor Lock-in Trap
docker.comยท3d
๐Ÿ”’Secure Boot
July 2025 Detection Highlights: 7 New VMRay Threat Identifiers, Config Extractors for 4 malware families, and 35+ fresh YARA rules.
vmray.comยท5d
๐Ÿฆ Malware Analysis
AI coding tools gain security โ€” but the controls do not cut it
reversinglabs.comยท2d
๐Ÿ”“Hacking
Show HN: Zen Lake โ€“ 50B-digit ฯ€ computation on modest hardware
github.comยท1dยท
Discuss: Hacker News
โšกHomebrew CPUs
Show HN: I built a toy TPU that can do inference and training on the XOR problem
tinytpu.comยท4dยท
Discuss: Hacker News
โšกHomebrew CPUs
One Is Eager, Another Is a Bootlicker, and the Other Is Unhinged: Decoding the Personalities of AI
hackernoon.comยท1d
๐Ÿ”“Hacking
HigherOrderCO/HVM3
github.comยท16h
๐Ÿ”—Functional Compilers
Learn every individual feature your CPU supports with SpecSeek
github.comยท23hยท
Discuss: Hacker News
โšกPerformance Tools
Loading...Loading more...
AboutBlogChangelogRoadmap