🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Soviet Cryptography

Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology

NowSecure Achieves SOC 2 Type 2 Compliance for Fifth Year in a Row β€” With Zero Deficiencies
nowsecure.comΒ·2d
βœ…Archive Fixity
Joomla Security Testing Guide 2025 : Recon and Exploitation
hackertarget.comΒ·1d
πŸ›‘οΈSecurity Headers
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies β€” and How to Stop Them
lmgsecurity.comΒ·2d
πŸ”“Hacking
Top 10 Kilt Traditions That Strengthen Family Bonds
dev.toΒ·2hΒ·
Discuss: DEV
🌳Format Genealogy
DoubleAgents: Fine-Tuning LLMs for Covert Malicious Tool Calls
pub.aimind.soΒ·2dΒ·
Discuss: Hacker News, r/LLM
πŸ’»Local LLMs
As The Nintendo, Palworld Lawsuit Continues, Switch 2 Store Hosts Blatant Palworld Clone
techdirt.comΒ·6h
πŸ“ΊRetrogaming
Scheduled messages are the hottest trend on iPhone and Android - here's 13 times you might want to send that text later
techradar.comΒ·1d
🌳Trie Structures
Losing GPT-4o sent some people into mourning. That was predictable.
technologyreview.comΒ·1d
πŸ›Digital humanities
China targets 2 Lithuanian banks in response to new EU sanctions
the-independent.comΒ·1d
🌐DNS Security
Six Costly Pitfalls in Log Collection: From Local Management Missteps to Looming System Failures
hackernoon.comΒ·1d
πŸ‘οΈObservatory Systems
Building Love Studios NYC β€” the story, the stack (Python + C++), the problems, and our roadmap
dev.toΒ·1dΒ·
Discuss: DEV
🌊Streaming Systems
Uncertainty-Aware Prediction of Parkinson's Disease Medication Needs: A Two-Stage Conformal Prediction Approach
arxiv.orgΒ·1d
🧠Machine Learning
SingleStrip: learning skull-stripping from a single labeled example
arxiv.orgΒ·1d
πŸŒ€Differential Geometry
SynBrain: Enhancing Visual-to-fMRI Synthesis via Probabilistic Representation Learning
arxiv.orgΒ·1d
🧠Neural Codecs
Predictive Metabolic Reprogramming for Early-Stage Colorectal Cancer Detection via Multi-omics Integration
dev.toΒ·8hΒ·
Discuss: DEV
πŸ“ŠHyperLogLog
Automated Design Space Exploration for Hypersonic Vehicle Aerodynamic Optimization via Constrained Bayesian Optimization
dev.toΒ·3hΒ·
Discuss: DEV
πŸŒ€Differential Geometry
Google Chrome Enterprise: Extend Protections From Browser to OS
darkreading.comΒ·1d
πŸ”“Hacking
PYNQ-Z2 Music Visualizer
hackster.ioΒ·3d
⚑Homebrew CPUs
Show HN: Guardian Protocol – Open-Source Ethereum Security Framework
github.comΒ·3dΒ·
Discuss: Hacker News
πŸ”CBOR
2024 Device intelligence by the numbers
fingerprint.comΒ·1d
πŸ”—Binary Similarity
Loading...Loading more...
AboutBlogChangelogRoadmap