๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Soviet Cryptography

Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology

Vulnerability in Akcess-Net Lepszy BIP software
cert.plยท1h
๐Ÿ’ฃZIP Vulnerabilities
The Kepler Problem (Part 11)
johncarlosbaez.wordpress.comยท4d
๐Ÿ•ธ๏ธTensor Networks
A New Era of Transparency for CVE Data Quality
jerrygamblin.comยท11h
๐Ÿ”CBOR
Chinese SMS Spammers Go Mobile
garwarner.blogspot.comยท23hยท
Discuss: garwarner.blogspot.com
๐Ÿ•ต๏ธVector Smuggling
Speed kills: AI coding tools revive old-school hacks
reversinglabs.comยท21h
๐Ÿš€Indie Hacking
From Linux Primitives to Kubernetes Security Contexts
learnkube.comยท2d
๐Ÿ“ฆContainer Security
AI model 'personalities' shape the quality of generated code
theregister.comยท23h
๐Ÿ“Code Metrics
Hackers leak North Korean groupโ€™s data
the-independent.comยท23h
๐Ÿ”“Hacking
Secure chat darling Matrix admits pair of 'high severity' protocol flaws need painful fixes
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Sloppy AI defenses take cybersecurity back to the 1990s, researchers say
scworld.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Building Four Dog Paws: the story, the code, the challenges, and the roadmap
dev.toยท5hยท
Discuss: DEV
๐Ÿ“ŠFeed Optimization
URL Inspection Tasks: Helping Users Detect Phishing Links in Emails
usenix.orgยท1d
๐ŸŒWARC Forensics
Newly released letters offer glimpse into lives of WWII codebreakers
the-independent.comยท2d
๐Ÿ”Polish Cryptanalysis
AST-n: A Fast Sampling Approach for Low-Dose CT Reconstruction using Diffusion Models
arxiv.orgยท8h
โœ…Lossless Bounds
AI Security Map: Holistic Organization of AI Security Technologies and Impacts on Stakeholders
arxiv.orgยท1d
๐Ÿ”Vector Forensics
ZeroGPT: A lightweight AI library for text and image generation with an uncensored mode
dev.toยท2dยท
Discuss: DEV
๐Ÿ“ธPNG Optimization
AI Blob! LLM-Driven Recontextualization of Italian Television Archives
arxiv.orgยท8h
๐Ÿ›Digital humanities
Training Kindai OCR with parallel textline images and self-attention feature distance-based loss
arxiv.orgยท1d
๐Ÿค–Advanced OCR
๐ŸŽ‘Beginners guide to "869. Reordered Power of 2"(C++ | JavaScript | Python)
dev.toยท4dยท
Discuss: DEV
๐Ÿ“Interval Arithmetic
Autonomous Anomaly Detection in Multi-Sensor Satellite Imagery for Battlefield Assessment
dev.toยท12hยท
Discuss: DEV
๐Ÿ‘๏ธObservatory Systems
Loading...Loading more...
AboutBlogChangelogRoadmap