๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ‡ธ๐Ÿ‡ช Swedish Cryptanalysis

Nordic Cipher History, Scandinavian Security, Regional Cryptography, Historical Analysis

From Molotovโ€“Ribbentrop to the Sino-Soviet Schism and Todayโ€™s Triangular Rivalry
kkrva.seยท2d
๐Ÿ”Soviet Cryptography
Steering a middle ground between two extreme takes on the role of statistics in the development of language models
statmodeling.stat.columbia.eduยท2d
๐Ÿ’ปProgramming languages
Zuckermuskian solopsism
doctorow.medium.comยท2d
๐Ÿ”ฒCellular Automata
Greater Israel: Theology as Cartography โ€“ Cartography as Catastrophe
blogs.timesofisrael.comยท4hยท
Discuss: Hacker News
๐ŸŒDistributed Hash Tables
โ€˜Landmines have become the greatest protectorsโ€™: how wildlife is thriving in the Korean DMZ
theguardian.comยท4h
๐Ÿ”Soviet Cryptography
Serbian cities have been gripped by days of clashes between anti-government protesters and security forces.
dw.comยท2d
๐Ÿ”Polish Cryptanalysis
Anonymous Feedback vs 1:1 Conversations: Which Builds More Trust?
dev.toยท4hยท
Discuss: DEV
๐ŸŒProtocol Synthesis
Trump's Justice Department is investigating whether DC police officials falsified crime data
the-independent.comยท1d
๐ŸšจIncident Response
Fashionable Phishing Bait: GenAI on the Hook
unit42.paloaltonetworks.comยท1d
๐ŸŽซKerberos History
Generalized quantum Chernoff bound
arxiv.orgยท2d
โš›๏ธQuantum Channels
SecureGuard: DIY Arduino Keypad-PIR Alarm with LCD Feedback
hackster.ioยท1d
๐Ÿ Home Automation
Evaluating the Quality of Open Building Datasets for Mapping Urban Inequality: A Comparative Analysis Across 5 Cities
arxiv.orgยท2d
๐Ÿ”ถVoronoi Diagrams
Dimension-Decomposed Learning for Quadrotor Geometric Attitude Control with Almost Global Exponential Convergence on SO(3)
arxiv.orgยท5h
๐ŸŒ€Differential Geometry
Sociotechnical Imaginaries of ChatGPT in Higher Education: The Evolving Media Discourse
arxiv.orgยท5h
๐Ÿ›Digital humanities
๐—”๐—œ ๐—›๐—ฎ๐—น๐—น๐˜‚๐—ฐ๐—ถ๐—ป๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€: ๐—Ÿ๐—ฒ๐˜€๐˜€๐—ผ๐—ป๐˜€ ๐—ณ๐—ฟ๐—ผ๐—บ ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐—ฎ๐—น ๐—˜๐˜…๐—ฝ๐—ฒ๐—ฟ๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ
dev.toยท22hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
How to detect impossible travel and stop suspicious logins
fingerprint.comยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
Automated Leadership Pipeline Assessment via Multi-Modal Data Fusion and HyperScore Evaluation
dev.toยท1dยท
Discuss: DEV
๐Ÿ“ŠFeed Optimization
Automated Assessment of Aesthetic Outcomes in Facial Plastic Surgery
arxiv.orgยท1d
๐ŸŒ€Differential Geometry
MAD: A Benchmark for Multi-Turn Audio Dialogue Fact-Checking
arxiv.orgยท2d
๐ŸŽ™๏ธWhisper
Nathan Lentsโ€™s New Book Explores How Animal Behavior and Evolution Challenge Binary Sex and Gender Norms
scientificamerican.comยท23h
๐ŸงฌBitstream Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap