Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔬 Refinement Types
Specific
Liquid Haskell, Contract Programming, SMT Integration, Type Safety
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
26612
posts in
14.1
ms
The Boy That
Cried
Mythos: Verification is
Collapsing
Trust in Anthropic
🔓
Hacking
flyingpenguin.com
·
3d
·
Hacker News
EU Age
Verification
Hacked
in 2 Minutes: What Actually Happened
🔓
Hacking
pasqualepillitteri.it
·
5d
·
Hacker News
Signing
load
modules
on z/OS
🔒
Hardware Attestation
colinpaice.blog
·
2d
EU age verification app: "
Worry-free
package" with security
vulnerabilities
🚀
Indie Hacking
heise.de
·
6d
·
Hacker News
Is Your CEO a
Deepfake
? 5 Ways to Secure Your Business Against AI
Scams
🎯
Threat Hunting
hackernoon.com
·
1d
Proton
CEO warns global age verification push will mean "the death of
anonymity
online"
🛡
Cybersecurity
techradar.com
·
2d
midspiral/LemmaScript
: verification toolchain for TypeScript (Tech Preview)
🛡️
Proof-Carrying Archives
github.com
·
4d
·
Hacker News
Deductive
Verification of Weak Memory Programs with View-based
Protocols
(extended version)
🧠
Separation Logic
arxiv.org
·
1d
California's New Age
Verification
Law: What It Means for
AlmaLinux
🔓
Open Source Software
almalinux.org
·
4d
·
r/linux
The rise of age
verification
: What
governments
, platforms, and devices are
🔐
Homomorphic Encryption
proton.me
·
3d
Two Months in Google
OAuth
Verification
Hell
🎫
Kerberos Attacks
zencapital.substack.com
·
4d
·
Substack
EU age verification app can be
hacked
in 2 minutes, says
Telegram
founder
🔤
EBCDIC Privacy
the-independent.com
·
5d
The Content Management System Is Dead. Long Live the
Context
Management System.
📰
Content Curation
hackshackers.com
·
3d
·
Hacker News
Age
verification
and privacy: let's try to be
objective
🔐
Homomorphic Encryption
kevinboone.me
·
6d
SpecSyn
: LLM-based Synthesis and Refinement of Formal
Specifications
for Real-world Program Verification
⚖️
Verification Calculi
arxiv.org
·
1d
The EU’s age
verification
app was
hacked
in two minutes
🔓
Hacking
proton.me
·
5d
Breaking Email Trust: How I
Bypassed
Email
Verification
in a Real-World Application.
🔓
Hacking
infosecwriteups.com
·
4d
AlmaLinux
Takes a Wait-and-See
Stance
on California Age Verification Law
⚖️
Legal Compliance
linuxiac.com
·
3d
Data-hugging
shields
proprietary AI models from research that could
disprove
them
🔍
Vector Forensics
nature.com
·
4d
·
Hacker News
Extending
Contract Verification for Parallel Programming Models to
Fortran
⚡
Parallel Computing
arxiv.org
·
2d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help