🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ RISC-V Security

Hardware Extensions, PMP, Secure Enclaves, Open Security

Running shadow system tests in RISC-V
ikerexxe.github.io·11h
👑RISC-V Privilege
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔢Bitwise Algorithms
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·1d
💣ZIP Vulnerabilities
PicoEMP: low-cost Electromagnetic Fault Injection (EMFI) tool
github.com·15h·
Discuss: Hacker News
⚡Circuit Archaeology
82 x 50mm SoM combines NXP i.MX 8M Mini SoC with 25 TOPS DEEPX DX-M1 AI accelerator
cnx-software.com·1h
🖥️Hardware Architecture
Linux Jargon Buster: What are Secure Boot & Shim Files?
itsfoss.com·10h
🔒Secure Boot
Program Execution, follow-up
windowsir.blogspot.com·6h·
Discuss: www.blogger.com
⚡Performance Tools
Intel GPUs Gain 20% Performance by Disabling Security Mitigations
techpowerup.com·2d·
Discuss: Hacker News
🖥️Modern Terminals
Worth Reading 062425
rule11.tech·2h
🌐DNS over QUIC
Ubuntu Fundamentals: release
dev.to·1d·
Discuss: DEV
❄️Nix Adoption
Hundreds of MCP Servers Expose AI Models to Abuse, RCE
darkreading.com·2h
🔓Hacking
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·6h
🦠Malware Analysis
Considering making a home server, talk me in or out of it, and help me decide on parts...
reddit.com·7h·
Discuss: r/homelab
🏠HomeLab
How to (Almost) solve cybersecurity once and for all
adaptive.live·21h·
Discuss: Hacker News
🔐Systems Hardening
Fixes for five Lix CVEs
lix.systems·1d·
Discuss: Lobsters
❄️Nix Adoption
ZFS in Virtualization: Storage Backend for the Pros
klarasystems.com·1h
💿ZFS Internals
ICSA Colloquium Talk - 10/07/2025
informatics.ed.ac.uk·7h
🧲RISC-V Archaeology
Goodbye, Intel! The chips keep changing, but the Mac remains the Mac (Macworld/Jason Snell)
macworld.com·7h
🖥️Vintage Macintosh
What Is DLL Hijacking? Understanding and Preventing the Threat
securityscorecard.com·22h
🎯NTLM Attacks
Teaching an Emulator How to Talk
mrcat.au·1d·
Discuss: Hacker News
🎯Emulator Accuracy
Loading...Loading more...
AboutBlogChangelogRoadmap