🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Swedish Cryptography

Regional Security Research, Nordic Standards, Cultural Encryption, Scandinavian Innovation

Obfuscated Quantum and Post-Quantum Cryptography
arxiv.orgΒ·1d
πŸ”Quantum Security
Demystifying the (In)Security of QR Code-based Login in Real-world Deployments
usenix.orgΒ·12h
πŸ›‘οΈWASM Sandboxing
Digital Forensics Round-Up, August 13 2025
forensicfocus.comΒ·5h
πŸ”¬Archive Forensics
MLS: The Naked King of End-to-End Encryption
poberezkin.comΒ·22hΒ·
Discuss: Hacker News
πŸ”Archive Encryption
Northern losses and southern gains: Climate change reshapes moth communities across Finland
phys.orgΒ·1d
🧊Arctic Storage
Android’s pKVM Becomes First Globally Certified Software to Achieve Prestigious SESIP Level 5 Security Certification
security.googleblog.comΒ·1dΒ·
Discuss: www.blogger.com
πŸ›‘οΈARM TrustZone
Ika Core Contributor dWallet Labs Reveals REFHE: First FHE Scheme That Works Like a Real CPU
hackernoon.comΒ·4h
πŸ”Homomorphic Encryption
Preparing for the Post-Quantum Era: Best Practices for Federal Agencies
medium.comΒ·1d
πŸ”Quantum Security
How an attacker can downgrade Whatsapp encryption
heise.deΒ·2d
🌊Stream Ciphers
Mathematician Finds Easier Way to Solve Quadratic Equations
popularmechanics.comΒ·6h
πŸ”’Reed-Solomon Math
Social Democrats want to see documents left behind by former national security advisor
sverigesradio.seΒ·1d
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
Enhancing Developing Nations' Role in Global Tech Standardization via Federated Learning & Blockchain Validation
dev.toΒ·1dΒ·
Discuss: DEV
🀝Distributed Consensus
InfoSec News Nuggets 8/13/2025
aboutdfir.comΒ·3h
πŸ›‘Cybersecurity
Worth Reading 081325
rule11.techΒ·5h
πŸ“ŸHistorical Protocols
Beyond Theory – Interview with Aap Tepper by Viktorija Gardoviča
ica.orgΒ·4h
πŸ”„Archival Workflows
Get Org.apache.xml.security Working with GraalVM
guust.ysebie.beΒ·6hΒ·
Discuss: Hacker News
πŸ›‘οΈWebAssembly Security
Decentralized Proof-of-Location systems for trust, scalability, and privacy
nature.comΒ·2dΒ·
Discuss: Hacker News
🀝Distributed Consensus
The Online Safety Act isn't just about age verification – end-to-end encryption is also at risk
techradar.comΒ·3h
πŸ”“Hacking
What Is the Luhn Algorithm? The Math Behind Secure Credit Card Numbers
scientificamerican.comΒ·1d
🎯Arithmetic Coding Theory
How to Stay a Step Ahead of a Non-Obvious Threat
darkreading.comΒ·1d
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap