๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Soviet Cryptography

Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology

Let Me Preface Thatโ€ฆ
systemsapproach.orgยท3d
๐ŸŒBGP Security
A new way to test how well AI systems classify text
news.mit.eduยท22h
๐Ÿ”คCharacter Classification
Steven Heller's font of the month: Experimo
ilovetypography.comยท1hยท
Discuss: Hacker News
๐Ÿ–‹Typography
Feynman corner: We have access to a lot more examples than we used to.
statmodeling.stat.columbia.eduยท3h
๐ŸŒก๏ธPreservation Physics
Mbodi AI (YC X25) Is Hiring a Founding Research Engineer (Robotics)
ycombinator.comยท5hยท
Discuss: Hacker News
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Thoughts on GPT-5
jgibbs.devยท2dยท
Discuss: Hacker News
๐Ÿ”Concolic Testing
Classification of the Approaches to the Technological Resurrection
academia.eduยท4dยท
Discuss: Hacker News
๐ŸŒก๏ธPreservation Physics
People can exploit your social media pictures and so I've made a tool
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Most Asked SQL Interview Questions and Answers for 2025
dev.toยท10hยท
Discuss: DEV
๐Ÿ—ƒ๏ธDatabase Forensics
Study pits super-recognizers against digitally manipulated face images
phys.orgยท2d
๐ŸŽฏThreat Hunting
Faster Reed-Solomon Erasure Coding in Java with Go and FFM
kohlschuetter.github.ioยท3dยท
Discuss: Hacker News, r/golang
๐Ÿ”งKAITAI
Putin is floating a new nuclear deal with the US โ€“ but why now?
the-independent.comยท1h
๐Ÿ‡ท๐Ÿ‡บRussian Computing
How to Build Abstractions in Rust Applications (2023)
orodu.netยท3hยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿฆ€Rust Borrowing
Creating Push Button Trading: A Journey in Algorithmic Trading with Python and C++
dev.toยท1dยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
WinRAR: Security vulnerability attacked by two different groups
heise.deยท1d
๐Ÿ’ฃZIP Vulnerabilities
๐Ÿง  From Specs to Sentience: How Kiro IDE Helped Me Build a Reactive AI Dungeon in Days
dev.toยท7hยท
Discuss: DEV
๐ŸŽฎSwitch Archaeology
UK immigration system targeted by hackers - dangerous new phishing campaign hits Sponsorship Management System
techradar.comยท6h
๐Ÿ”“Hacking
AST-n: A Fast Sampling Approach for Low-Dose CT Reconstruction using Diffusion Models
arxiv.orgยท13h
โœ…Lossless Bounds
AI Security Map: Holistic Organization of AI Security Technologies and Impacts on Stakeholders
arxiv.orgยท1d
๐Ÿ”Vector Forensics
Glowing algae reveal the geometry of life
phys.orgยท1h
๐Ÿ•ธ๏ธAlgebraic Topology
Loading...Loading more...
AboutBlogChangelogRoadmap