๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ Steganographic Compression

Hidden Data Channels, Covert Storage, Format Camouflage, Information Hiding

How do CAPTCHAs Work?
corero.comยท5h
โšกProof Automation
Quantum computing: secure in the long term thanks to QKD
heise.deยท6h
๐Ÿ”Quantum Security
Sextortion email scammers increase their “Hello pervert” money demands
malwarebytes.comยท8h
๐ŸŽซKerberos Attacks
SlimMoE: Structured Compression of Large MoE Models via Expert Slimming and Distillation
arxiv.orgยท1d
โšกModern Compression
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgยท1d
๐Ÿ”ขBitwise Algorithms
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.comยท1d
๐ŸŒณArchive Merkle Trees
Building an ML model to generate fonts
fontweaver.comยท1dยท
Discuss: Hacker News
๐Ÿ” Terminal Fonts
Cybercriminals Abuse Open-Source Tools To Target Africaโ€™s Financial Sector
unit42.paloaltonetworks.comยท20h
๐ŸŽซKerberos Exploitation
A Deep Learning Based Method for Fast Registration of Cardiac Magnetic Resonance Images
arxiv.orgยท14h
๐ŸŒ€Riemannian Computing
A large deviation view of \emph{stationarized} fully lifted blirp interpolation
arxiv.orgยท14h
๐Ÿ“Compression Bounds
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.toยท14hยท
Discuss: DEV
๐ŸŽตSpectral Hashing
After more than twenty years: Time for a new PNG
heise.deยท8h
๐Ÿ–ผ๏ธJPEG XL
Ask HN: Feedback on "QSS" โ€“ A Quantized Vector Search Engine in C
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ—‚๏ธVector Databases
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.orgยท1d
โš”๏ธLean Tactics
Video Compression for Spatiotemporal Earth System Data
arxiv.orgยท14h
๐Ÿ“ŠRate-Distortion Theory
Compbolt: A lib with a hard to misuse API (based on Matt Godbolt)
github.comยท9hยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Why Your Next LLM Might Not Have A Tokenizer
towardsdatascience.comยท23h
๐Ÿค–Grammar Induction
Writing Parallel File Compression with Memory Control
beyondthesyntax.substack.comยท3dยท
Discuss: Substack, r/golang, r/programming
๐ŸŒŠStreaming Compression
SonicWall warns of fake VPN apps stealing user logins and putting businesses at risk - here's what we know
techradar.comยท2h
๐Ÿ”“Hacking
UltraSketchLLM: Saliency-Driven Sketching for Ultra-Low Bit LLM Compression
arxiv.orgยท1d
๐Ÿ—œ๏ธLZW Variants
Loading...Loading more...
AboutBlogChangelogRoadmap