🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Soviet Cryptography

Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology

Quantum Complexity Theory Student Project Showcase #5 (2025 Edition)!
scottaaronson.blogΒ·1d
πŸ•ΈοΈTensor Networks
A new book reveals the mundane lives of Stasi agents spying often on family and friends.
dw.comΒ·1d
πŸ›οΈEastern European Computing
Don't Expose Your IDs: An Introduction to Obfuskey in Python
dev.toΒ·1dΒ·
Discuss: DEV
πŸ§ͺBinary Fuzzing
Encrypted Client Hello Approved for Publication
feistyduck.comΒ·2dΒ·
Discuss: Hacker News
🌐NetworkProtocols
Strangers in the Family Album: Reflections on Soviet Amateur Photography
publicbooks.orgΒ·1d
πŸ›Digital humanities
The β€œElectron Shower” That’s Revolutionizing Microchip Manufacturing
scitechdaily.comΒ·3h
πŸ“„Document Digitization
Estonia ramps up defence budget to €10bn in face of Russian threat
estonianworld.comΒ·36m
πŸ”Polish Cryptanalysis
NIST Post-Quantum Cryptography Standard Algorithms Based on Quantum Random Number Generators
arxiv.orgΒ·3d
πŸ”Quantum Cryptography
miniHDL: A Python Hardware Description Language DSL
nicholas.carlini.comΒ·20hΒ·
Discuss: Hacker News
⚑Circuit Design
Russian hacker group using Internet service providers to spy on foreign embassies
intelnews.orgΒ·8h
πŸ”“Hacking
GITEX GLOBAL 2025
darkreading.comΒ·1d
πŸ›‘Cybersecurity
The Good, the Bad and the Ugly in Cybersecurity – Week 31
sentinelone.comΒ·23h
πŸ›‘Cybersecurity
The Age of Electronic Totalitarianism
newenglishreview.orgΒ·21h
🧲Magnetic Philosophy
Pallas, Vesta, and Zcash
johndcook.comΒ·50m
πŸ”’Reed-Solomon Math
A safer memcpy with very limited use cases
subethasoftware.comΒ·19h
πŸ§ͺBinary Fuzzing
On This Day in Math - August 1
pballew.blogspot.comΒ·1dΒ·
Discuss: www.blogger.com
🍎Apple Computing
MQWEB and passtickets
colinpaice.blogΒ·18h
🏒IBM Mainframes
OTW - Bandit Level 0 to Level 1
tbhaxor.comΒ·1d
πŸ›‘οΈCLI Security
Hack The Box Academy Writeup β€” PASSWORD ATTACKS β€” Writing Custom Wordlists and Rules
infosecwriteups.comΒ·1d
πŸ”“Password Cracking
Lobsters Interview with Icefox
lobste.rsΒ·19hΒ·
Discuss: Lobsters
πŸ¦€Rust Macros
Loading...Loading more...
AboutBlogChangelogRoadmap