🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Soviet Cryptography

Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology

Making modern Debian look like 20 year old Ubuntu. Why? Because!
82mhz.net·2d
⌨️Terminal Customization
Final Fantasy 14 on macOS with a 36 key keyboard
xeiaso.net·2d
🍎XNU Internals
Daily Cover Story
forbes.com·1d
🔍BitFunnel
Spec Miata reality check.
contravex.com·1d
🏠Personal Archives
Spain's football league threatens Cloudflare customers with legal action
redeszone.net·13h·
Discuss: Hacker News
🏴‍☠️Piracy
Private Placement Memorandum (PPM): The Anchor Document for Every AIF
aifservices.in·19h·
Discuss: Hacker News
✅Format Verification
Blocky Planet – Making Minecraft Spherical
bowerbyte.com·15h·
Discuss: Hacker News
💎Information Crystallography
Unikernel Cronjobs on AWS
nanovms.com·1d·
Discuss: Hacker News
🌊Streaming Systems
Everything Is Correlated
gwern.net·4d·
Discuss: Hacker News
📡Information theory
Building a Regex Engine
abstractsyntaxseed.com·5d·
Discuss: Lobsters, Hacker News
🔍RegEx Engines
Screwworm larvae eat their way into US via overseas traveler’s flesh
arstechnica.com·11h
💿WORM Storage
A Magnetized Needle and a Steady Hand (2016)
nullprogram.com·5d·
Discuss: Hacker News
🔧RISC-V Assembler
The Great Giana Sisters (COMMODORE 64)
retrovania-vgjunk.blogspot.com·1d·
Discuss: Lobsters, Hacker News
📺Retrogaming
We need a new theory of democracy – because this version has failed
salon.com·1d·
Discuss: Hacker News
🤝Distributed Consensus
How Python Software Enhances Post Construction Cleaning
dev.to·13h·
Discuss: DEV
🔄Document Workflows
ELA-1507-1 luajit security update
freexian.com·8h
🔓Hacking
Bug bounties: The good, the bad, and the frankly ridiculous ways to do it
theregister.com·1d·
Discuss: Hacker News
🚀Indie Hacking
King praises ‘unbreakable courage’ of the Ukrainian people
the-independent.com·1d
🔍Polish Cryptanalysis
VB: It Is Now Time To Buy Small-Cap Companies
seekingalpha.com·2h
🔍BitFunnel
Windsurf: Memory-Persistent Data Exfiltration (SpAIware Exploit)
embracethered.com·3d
🧠Memory Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap