🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Soviet Cryptography

Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology

Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comΒ·1d
πŸ”Cryptographic Archaeology
Estonia in the grip of the Molotov-Ribbentrop Pact and the realpolitik of great powers
estonianworld.comΒ·13h
πŸ‡·πŸ‡ΊSoviet Computing
Show HN: Novel GPT-2 sampling and memory architecture
github.comΒ·10hΒ·
Discuss: Hacker News
πŸ’ŽInformation Crystallography
Data Science Path: Automatic Subclass Registration & Python Encryption Algorithms with LabEx
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”Cryptographic Archaeology
Unveiling Russian intelligence failures in the Ukraine conflict: a strategic culture perspective
tandfonline.comΒ·16h
πŸ”ŽOSINT Techniques
Knuth’s Twindragon
johndcook.comΒ·7h
πŸ“Mathematical Art
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comΒ·3hΒ·
Discuss: www.blogger.com
🎯Threat Hunting
Fox pairing
ncatlab.orgΒ·8h
πŸ”±Galois Theory
Would You Believe This Spy’s Name?
nytimes.comΒ·9h
🎯Gradual Typing
Stop Calling It OSINT
dutchosintguy.comΒ·1d
πŸ”ŽOSINT Techniques
Quantum computing explained: what it means for cybersecurity β€” and why it's coming faster than you think
techradar.comΒ·1d
πŸ”Quantum Security
Manuel M T Chakravarty: Functional data structures in Swift
justtesting.orgΒ·3h
🧬Functional Programming
Hacker and Physicist – A Tale of "Common Sense"
supasaf.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Cryptographic Archaeology
Debugging Behind the Iron Curtain (2010)
jakepoz.comΒ·3dΒ·
Discuss: Hacker News
πŸ‡·πŸ‡ΊRussian Computing
9 Best Keyboards (2025), Tested and Reviewed
wired.comΒ·7h
⌨️Mechanical Keyboards
The "rack we have at home"
i.redd.itΒ·6hΒ·
Discuss: r/homelab
🏠Homelab Preservation
RTL generation for custom CPU Mrav
popovicu.comΒ·2h
βš™οΈModern Assembly
Resilience in the Face of Russian Aggression
theatlantic.comΒ·1d
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
M5Cardputer Morse Code Suite
hackster.ioΒ·1d
πŸ§ͺCassette Hacks
Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses
tenable.comΒ·1d
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap