Feeds to Scour
SubscribedAll
Cryptanalysis of Gleeok-128
arxiv.orgยท2d
๐Ÿ”Cryptographic Archaeology
Preview
Report Post
What is a Pedersen commitment?
johndcook.comยท20h
๐Ÿ”Quantum Security
Preview
Report Post
Cryptography for the Everyday Developer: Understanding RSA
sookocheff.comยท1d
๐Ÿ”Homomorphic Encryption
Preview
Report Post
Theory and AI Alignment
scottaaronson.blogยท7h
๐Ÿ”ฒCellular Automata
Preview
Report Post
Inside Shanya, a packer-as-a-service fueling modern attacks
news.sophos.comยท9h
๐ŸบZIP Archaeology
Preview
Report Post
Multiplying our way out of division
xania.orgยท1h
๐Ÿ“Interval Arithmetic
Preview
Report Post
Notes on Distributed Systems for Young Bloods (2013)
somethingsimilar.comยท17hยท
Discuss: Hacker News
๐ŸคDistributed Consensus
Preview
Report Post
Introducing constant-time support for LLVM to protect cryptographic code
blog.trailofbits.comยท5dยท
Discuss: Hacker News
๐Ÿฆ€Embedded Rust
Preview
Report Post
New Prompt Injection Attack Vectors Through MCP Sampling
unit42.paloaltonetworks.comยท1d
โšกgRPC
Preview
Report Post
How to Build Resilient Microservices in Go: Circuit Breakers and Bulkhead Patterns
dev.toยท2dยท
Discuss: DEV
๐ŸŒŠStream Processing
Preview
Report Post
State of the Homelab December 2025
reddit.comยท1dยท
Discuss: r/homelab
๐Ÿ HomeLab
Preview
Report Post
NEWS ROUNDUP โ€“ 5th December 2025
digitalforensicsmagazine.comยท2d
๐ŸšจIncident Response
Preview
Report Post
Bridging the gaps between protocol specifications and practice
blog.apnic.netยท2d
๐ŸŒNetworkProtocols
Preview
Report Post
3-2-1-1 Go: Implementing Foolproof Backups
derekseaman.comยท20h
๐Ÿ’ฟBackup Strategies
Preview
Report Post
Tested: JXND XJS4056-based Mini-USB Li-Ion/Li-Poly Battery Charger Module
goughlui.comยท5h
โš™๏ธDIY Electronics
Preview
Report Post
CISOs Should Be Asking These Quantum Questions Today
darkreading.comยท1d
๐Ÿ”Quantum Security
Preview
Report Post
Malicious Go Packages Impersonate Google's UUID Library and Exfiltrate Data
socket.devยท1dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Preview
Report Post
Read more: Swiss foundation sends demining machine to Ukraine
swissinfo.chยท2h
โšกProof Automation
Preview
Report Post
Confidential Computing Needs to Go Mainstream
servethehome.comยท2d
๐Ÿ”Homomorphic Encryption
Preview
Report Post
Solving a snaky math problem with Mathematica
leancrew.comยท19h
๐Ÿ“Interval Arithmetic
Preview
Report Post