🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🇸🇪 Swedish Cryptanalysis

Nordic Cipher History, Scandinavian Security, Regional Cryptography, Historical Analysis

Chekhov’s Tank
nybooks.com·2h
🏛Digital humanities
Client-side vs. server-side fingerprinting to prevent account takeover
fingerprint.com·1d
🏺Kerberos Archaeology
Why Is History Crucial to Politics?
historyforpeace.pw·1d·
Discuss: Hacker News
👪Geneology
Scrutinizing LLM Reasoning Models
cacm.acm.org·1d
✓Automated Theorem Proving
Fact Check: Fake claim of UK officers 'captured' in Ukraine
dw.com·2d
🔍Polish Cryptanalysis
A Spellchecker Used to Be a Major Feat of Software Engineering
prog21.dadgum.com·1d·
Discuss: Lobsters, Hacker News
🌳Trie Structures
Spatio-temporal indexing the Bluesky firehose
joelgustafson.com·1d·
Discuss: Hacker News
🗃️Database Storage
Rock-Paper-Scissors with Neural-Networks!
dev.to·8h·
Discuss: DEV
🔲Cellular Automata
UK's Ministry of Defence pins hopes on AI to stop the next massive email blunder
theregister.com·3d·
Discuss: Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
🤖 How I Transformed My Crypto Trading with AI: From 3-Hour Research to 15-Minute Intelligence
dev.to·13h·
Discuss: DEV
🔍BitFunnel
Cybersecurity must be a top priority for businesses from beginning to end
techradar.com·2d
🛡Cybersecurity
Predictive Maintenance Optimization for Diffuser-Augmented Wind Turbine Blade Erosion
dev.to·2h·
Discuss: DEV
🏺Computational Archaeology
U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·3d
🛡Cybersecurity
Evaluating, Synthesizing, and Enhancing for Customer Support Conversation
arxiv.org·2d
🎙️Whisper
Bayesian Optimization of Sparse Gaussian Process Regression for Real-Time Anomaly Detection in Industrial IoT
dev.to·17h·
Discuss: DEV
👁️Observatory Systems
CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector
securityaffairs.com·2d
🔓Hacking
Lurk – A Turing-complete programming language for ZK-SNARKs
github.com·23h·
Discuss: Hacker News
🧮Z3 Solver
Learning to Reason for Factuality
arxiv.org·1d
✓Automated Theorem Proving
Smoothing Slot Attention Iterations and Recurrences
arxiv.org·1d
🌊Streaming Algorithms
French firm Bouygues Telecom suffered a data breach impacting 6.4M customers
securityaffairs.com·19h
🔤EBCDIC Privacy
Loading...Loading more...
AboutBlogChangelogRoadmap