๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Soviet Cryptography

Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology

Daily life in occupied Luhansk means rising food prices, electricity and water shortages, and pressure from Russia.
dw.comยท20h
๐Ÿ‡ต๐Ÿ‡ฑElwro Systems
Newly discovered WinRAR exploit linked to Russian hacking group, can plant backdoor malware โ€” zero day hack requires manual update to fix
tomshardware.comยท8h
๐Ÿ’ฃZIP Vulnerabilities
Reading List 08/09/2025
construction-physics.comยท1d
๐ŸŒก๏ธPreservation Physics
OpenBSD Seeks Testers for USB Webcam H.264 Support
discoverbsd.comยท2d
๐Ÿ”ŒOperating system internals
Distributed Systems 101
mrinalxdev.github.ioยท2dยท
Discuss: Hacker News
๐ŸคDistributed Consensus
Feel sticky this summer? That's because it's been record muggy East of the Rockies
phys.orgยท2h
๐ŸŒก๏ธPreservation Physics
Show HN: VectorOps Know
vectorops.devยท3dยท
Discuss: Hacker News
๐ŸŒณIncremental Parsing
Cyber Threat Intelligence: Building Your Feed
infosecwriteups.comยท15h
๐Ÿ”“Hacking
Getting Good Results from Claude Code
dzombak.comยท2dยท
Discuss: Hacker News
โš”๏ธLean Tactics
5 ways to 10x your "Vibe" coding
dev.toยท1dยท
Discuss: DEV
๐Ÿฆ‹Format Metamorphosis
Stock Trading Simulator
dev.toยท14hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
What is wrong with Lisp? (2010)
web.archive.orgยท2dยท
Discuss: Hacker News
๐Ÿง Lisp Dialects
Lurk โ€“ A Turing-complete programming language for ZK-SNARKs
github.comยท2dยท
Discuss: Hacker News
๐ŸงฎZ3 Solver
The Proxy Playbook: Building Fast, Secure Middle Layers in Go
dev.toยท5hยท
Discuss: DEV
๐ŸŒDNS over QUIC
The Trixzon Protocol: Turning Caffeine and Chaos into Capital
dev.toยท12hยท
Discuss: DEV
๐Ÿ”BitFunnel
ESP32 Bus Pirate 0.5 โ€“ A Hardware Hacking Tool That Speaks Every Protocol
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŒSingle Board PC
Python Type Annotations (part 3)
dev.toยท14hยท
Discuss: DEV
๐Ÿ”คType Theory
ASCoT: An Adaptive Self-Correction Chain-of-Thought Method for Late-Stage Fragility in LLMs
arxiv.orgยท2d
โœ…Formal Methods
Automated High-Throughput Antibody Affinity Maturation via Multi-Objective Optimization and Predictive Modeling
dev.toยท15hยท
Discuss: DEV
๐Ÿ”RegEx Engines
The Hidden Bug in Go: Variable Shadowing Explained
dev.toยท2hยท
Discuss: DEV
๐Ÿฆ€Rust Macros
Loading...Loading more...
AboutBlogChangelogRoadmap