🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ RISC-V Security

Hardware Extensions, PMP, Secure Enclaves, Open Security

ESP32 Bus Pirate open-source firmware works on off-the-shelf hardware
cnx-software.com·40m
🔌Single Board PC
Gigabyte MZ73-LM0 Upgraded VRM heatsinks
forums.anandtech.com·1d
🖥️Modern CPU
Part 1: A Deep Dive into Rust and C Memory Interoperability
notashes.me·20h·
Discuss: Hacker News, r/programming
🔩Systems Programming
Bouncing on trampolines to run eBPF programs
bootlin.com·4h
🔍eBPF
openSUSE Leap 16.0 Enters RC Phase with SELinux by Default
linuxiac.com·3h
🔓Open Source Software
In Cybersecurity, We Have to Work Together
tenable.com·1h
🔓Hacking
A real PowerBook: the Macintosh Application Environment on a PA-RISC laptop
oldvcr.blogspot.com·2d·
Discuss: oldvcr.blogspot.com
🖥️Vintage Macintosh
The Coming Wave: Post-Quantum Cryptography and the Future of Cybersecurity
blog.publiccomps.com·9h·
Discuss: Hacker News
🔐Quantum Security
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs
arxiv.org·7h
⚡Proof Automation
AI Clouds Are Flying Blind: The Illusion of Runtime Protection
thenewstack.io·16h
🔍eBPF
Valuable News Summary for 2025/08/04
discoverbsd.com·1d
🔌Operating system internals
LetsTrust – Bringing Trusted Computing to the Maker World
hackster.io·2d
🔒Hardware Attestation
Hardening systemd services via system call filter
paperless.blog·3d
📦Container Security
Patchday: Critical malware vulnerability threatens Android 16
heise.de·1h
🔓Hacking
We're shipping to ARM64 and x64 without duplicating pipelines
caepe.sh·8h·
Discuss: Hacker News
❄️Nix Adoption
Complex Mini-ITX Proxmox Build
reddit.com·11h·
Discuss: r/homelab
🖥Home Lab Setup
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·1d
⚗️Algebraic Coding
Creating Our Own SG-1000 BIOS
bumbershootsoft.wordpress.com·2d
🎮Gameboy Emulation
️‍♂️ Tracking AgentTesla: Real-World Malware Behavior Analysis Using Joe Sandbox
infosecwriteups.com·2h
🦠Malware Analysis
Cybersecurity Instruction Tuned Model
huggingface.co·8h·
Discuss: Hacker News
🔒WASM Capabilities
Loading...Loading more...
AboutBlogChangelogRoadmap