🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Steganographic Compression

Hidden Data Channels, Covert Storage, Format Camouflage, Information Hiding

Optimising Docker Layers for Better Caching with Nix - Graham Christensen
grahamc.com·21h
📦METS Containers
Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability
welivesecurity.com·1d
💣ZIP Vulnerabilities
Going Faster Than Memcpy
squadrick.dev·1d·
Discuss: Lobsters, Hacker News, r/programming
⚡Cache Coherence
FOBNN: Fast Oblivious Inference via Binarized Neural Networks
arxiv.org·8h
🔢Binary Embeddings
modded-nanogpt: Analyzing value-embedding-, UNet-, and x0-lambdas
snimu.github.io·1d
📊Quantization
pi hole help.
reddit.com·7h·
Discuss: r/homelab
🌐DNS Security
Does GPT-2 Know Your Phone Number? (2020)
bair.berkeley.edu·22h·
Discuss: Hacker News
💻Local LLMs
GitHub - tomohiron907/Strecs3D
github.com·6h
📄Document Digitization
Pixel Code (font)
qwerasd205.github.io·3d
📟Terminal Typography
Decentralized Proof-of-Location systems for trust, scalability, and privacy
nature.com·17h·
Discuss: Hacker News
🤝Distributed Consensus
Estimating from No Data: Deriving a Continuous Score from Categories
towardsdatascience.com·11h
🧠Machine Learning
My tiny (1000 lines), fastish, embeddable scripting language can be AOT compiled
wareya.wordpress.com·7h·
Discuss: Lobsters, Hacker News
🏗️Compiler Archaeology
Understanding the Core Concepts: From Data Mountains to Informative Peaks
dev.to·11h·
Discuss: DEV
📐Vector Dimensionality
Colour Malarkey (2023)
retrorgb.com·17h·
Discuss: Lobsters, Hacker News
🌈Color Archaeology
Database.news – curated list of database news from authoritative sources
database.news·20h·
Discuss: Lobsters, Hacker News
🦴Database Paleontology
Accelerating Video Quality Control at Netflix with Pixel Error Detection
netflixtechblog.com·15h·
Discuss: Hacker News
🎨LUT Compression
Should I move to bitnamisecure/kubectl image or not
reddit.com·18h·
Discuss: r/kubernetes
📦Container Security
SLIP: Soft Label Mechanism and Key-Extraction-Guided CoT-based Defense Against Instruction Backdoor in APIs
arxiv.org·1d
🔐Cryptographic Archaeology
Optimal Representation for Right-to-Left Parallel Scalar Point Multiplication
arxiv.org·8h
🧮Algebraic Datatypes
Understanding Protein Language Models Series
chrishayduk.com·19h·
Discuss: Hacker News
🧮Kolmogorov Complexity
Loading...Loading more...
AboutBlogChangelogRoadmap