🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Soviet Cryptography

Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology

Debugging Behind the Iron Curtain (2010)
jakepoz.comΒ·19hΒ·
Discuss: Hacker News
πŸ‡·πŸ‡ΊRussian Computing
Show HN: SecretMemoryLocker – Q&A-Style Archive for Your Digital Life
secretmemorylocker.comΒ·7hΒ·
Discuss: Hacker News
πŸ”Archive Encryption
'Rosetta stone' of code allows scientists to run core quantum computing operations
phys.orgΒ·3h
βš›οΈQuantum Circuits
Europe's Ransomware Surge Is a Warning Shot for US Defenders
darkreading.comΒ·22h
πŸ”“Hacking
On This Day in Math - August 20
pballew.blogspot.comΒ·1dΒ·
Discuss: www.blogger.com
πŸ“Mathematical Art
Know Me by My Pulse: Toward Practical Continuous Authentication on Wearable Devices via Wrist-Worn PPG
arxiv.orgΒ·1d
🌊Stream Ciphers
How NATO Is Building Resilience Against Disruptive Cyber Technologies
forbes.comΒ·16hΒ·
Discuss: Hacker News
πŸ”Capability Systems
Saleae Analyzer for the BDM protocol
zetier.comΒ·13h
πŸ”¬Binary Analysis
Weaponizing image scaling against production AI systems
blog.trailofbits.comΒ·1h
πŸ•΅οΈVector Smuggling
An Update on Pytype
github.comΒ·19hΒ·
Discuss: Hacker News
🎯Gradual Typing
Ukraine Works to Identify 6,000 Bodies Sent From Russia in Makeshift Rail Platform Lab
nytimes.comΒ·3h
πŸ‡΅πŸ‡±Polish Assembly
CRYPTO 2025: Row Reduction Techniques for n-Party Garbling
esat.kuleuven.beΒ·3d
🌊Stream Ciphers
Russian cyber group exploits seven-year-old network vulnerabilities for long-term espionage
cyberscoop.comΒ·20h
πŸ•΅οΈPenetration Testing
Quantum-safe security: Progress towards next-generation cryptography
microsoft.comΒ·20h
πŸ”Quantum Security
Why do people keep writing about the imaginary compound Cr2Gr2Te6?
righto.comΒ·2dΒ·
Discuss: Hacker News
🧲Magnetic Domains
Computing Machinery and Intelligence (1950)
academic.oup.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Capability Systems
Encrypting a Debian install with UKI
anarc.atΒ·16h
πŸ”’Secure Boot
Scalable Quantum Annealing-Enhanced Topological Superconductor Design Optimization via Hyperdimensional Embedding
dev.toΒ·1dΒ·
Discuss: DEV
πŸ•ΈοΈTensor Networks
Duality
xythobuz.deΒ·2d
πŸ“ΌRetro Games
My Zip Isn't Your Zip: Identifying and Exploiting Semantic Gaps Between Parsers
usenix.orgΒ·3hΒ·
Discuss: Hacker News
πŸ’£ZIP Vulnerabilities
Loading...Loading more...
AboutBlogChangelogRoadmap