🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Soviet Cryptography

Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology

The WETC Double-Spend
blog.verichains.io·2d
🎫Kerberos Attacks
A No-BS Guide to Networking
perseuslynx.dev·1d·
Discuss: Hacker News, r/selfhosted
📡Network Protocol Design
Starting with pytest’s parametrize
nedbatchelder.com·2d·
Discuss: Lobsters, r/programming
⚡Proof Automation
iPhone DevOps
clearsky.dev·1d·
Discuss: Hacker News
🪟Awesome windows command-line
Ghost-Tapping and the Chinese cybercriminal retail fraud ecosystem
recordedfuture.com·19h·
Discuss: Hacker News
🎫Kerberos Attacks
Book Review: The Math Academy Way
ijfen.substack.com·1d·
Discuss: Substack
📚Proof Pedagogy
Lithuania to give children drone training to counter Russia threat
theguardian.com·2d·
Discuss: r/news, r/worldnews
🔍Polish Cryptanalysis
"I Want My Chart to Be Just for Me": Community-Engaged Design to Support Outpatient Healthcare for Resettled Communities
arxiv.org·8h
🌍Cultural Computing
Who Should Handle Your Digital ID?
hackernoon.com·2d
🔐PKI Archaeology
The journey of building a privacy-first Android app to 80+ stars and 100+ testers
dev.to·1d·
Discuss: DEV
🚀Indie Hacking
Extending the Entropic Potential of Events for Uncertainty Quantification and Decision-Making in Artificial Intelligence
arxiv.org·8h
📈Entropy Estimation
Aurawave AW100 modules aim to simplify Auracast and Bluetooth LE Audio product development
cnx-software.com·4h
📻Homebrew Protocols
Fine-Grained Safety Neurons with Training-Free Continual Projection to Reduce LLM Fine Tuning Risks
arxiv.org·1d
💻Local LLMs
Adaptive Optogenetic Protein Interaction Control via Real-Time Neural Network Feedback
dev.to·1d·
Discuss: DEV
☕Precision Brewing
LLMCARE: Alzheimer's Detection via Transformer Models Enhanced by LLM-Generated Synthetic Data
arxiv.org·8h
🎵Audio ML
Predictive Analytics for NBA Finals Player Performance Using Multi-Modal Data Fusion and Hierarchical Bayesian Modeling
dev.to·14h·
Discuss: DEV
🔃Feed Algorithms
AI-powered cyberattacks have devastating potential – but governments can fight fire with fire
techradar.com·2h
🎯Threat Hunting
Hyperdimensional Molecular Logic for Multi-Disease Biomarker Signature Analysis
dev.to·2d·
Discuss: DEV
🧬Palindrome Codes
Complex behaving Hardware with CircuitPython - Part II
hackster.io·2d
⚡Circuit Design
Enhanced Algorithmic Optimization for Sustainable Aquaculture Feed Production via Multi-Modal Data Fusion
dev.to·1d·
Discuss: DEV
📊Feed Optimization
Loading...Loading more...
AboutBlogChangelogRoadmap