🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Swedish Cryptography

Regional Security Research, Nordic Standards, Cultural Encryption, Scandinavian Innovation

Encryption and Decryption in Go: A Hands-On Guide
dev.toΒ·8hΒ·
Discuss: DEV
🌊Stream Ciphers
Today in Sweden: A roundup of the latest news on Tuesday
thelocal.seΒ·20h
πŸ‡ΈSweden
Get the dunce's cap - experts warn pathetically weak passwords in the education sector leave classrooms at risk
techradar.comΒ·21h
πŸ”“Password Cracking
How Does PGP Encryption Workβ€”and Is It Still Secure in 2025?
securityscorecard.comΒ·10h
πŸ”Quantum Security
New quantum record: Transmon qubit coherence reaches millisecond threshold
phys.orgΒ·17h
βš›οΈQuantum Tape
PQC for the RPKI
labs.ripe.netΒ·12h
πŸ”Quantum Cryptography
The State of Post-Quantum Cryptography (PQC) on the Web
f5.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Quantum Security
Superimposed codes, take two
blog.sesse.netΒ·6h
πŸ”’Bitwise Algorithms
Proof Complexity 2025
cstheory-events.orgΒ·1d
🎯Performance Proofs
Sweden reach quarter-finals while knocking two teams out of Women’s Euro 2025
the-independent.comΒ·5h
πŸ‡ΈSweden
RVISmith: Fuzzing Compilers for RVV Intrinsics
arxiv.orgΒ·22h
πŸ›Fuzzing
South Korean Government Imposes Penalties on SK Telecom for Breach
darkreading.comΒ·1h
πŸ›‘Cybersecurity
Announcing FOKS, the Federated Open Key Service
blog.foks.pubΒ·12hΒ·
Discuss: Lobsters, Hacker News
🏠Homelab Federation
Launch Event of the report β€˜Standardisation with Chinese Characteristics? The Missing Pillar in Rebooting Europe’s Industrial Policy’
criticalinfralab.netΒ·13h
πŸ‡ΈπŸ‡ͺNordic Standards
A worrying tech shift in the EU
aardvark.co.nzΒ·11h
πŸ”€EBCDIC Privacy
Early Signs of Steganographic Capabilities in Frontier LLMs
arxiviq.substack.comΒ·13hΒ·
Discuss: Substack
πŸ’»Local LLMs
Approach to mainframe penetration testing on z/OS. Deep dive into RACF
securelist.comΒ·16h
πŸ—„οΈDatabase Internals
Decoding TCP SYN for stronger network security
blog.apnic.netΒ·2h
πŸ“ŠPCAP Analysis
Ancient Egyptian multiplication - Wikipedia
en.m.wikipedia.orgΒ·1d
πŸ—οΈPaleocryptography
Detection Engineering: Practicing Detection-as-Code – Introduction – Part 1
blog.nviso.euΒ·18h
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap