🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Swedish Cryptography

Regional Security Research, Nordic Standards, Cultural Encryption, Scandinavian Innovation

Cybersecurity Snapshot: Asset Inventories Key for OT Security, CISA Says, as NIST Issues Lightweight Algorithms to Secure IoT Devices
tenable.com·18h
🛡Cybersecurity
Encrypted Computation: What if Decryption Wasn’t Needed? • Katharine Jarmul • GOTO 2024
youtube.com·1d
🔐Homomorphic Encryption
Securing the Quantum Age
paloaltonetworks.com·1d
🔐Quantum Security
History of Baltic Sea's Gotska Sandön includes both trade and piracy
phys.org·14h
🇸🇪Swedish Cryptanalysis
The Swedish Kings of Cyberwar
nybooks.com·2d·
Discuss: Hacker News
🇸🇪Swedish Cryptanalysis
Ed25519 Support in Chrome: Making the Web Faster and Safer
ipfsfoundation.org·23h·
Discuss: Lobsters
🌐Web Standards
On This Day in Math - August 16
pballew.blogspot.com·3h·
Discuss: www.blogger.com
📚Archive Mathematics
Embedded Device Security: Protecting Linux Systems with Modern Tools
cnx-software.com·1d
🔒Secure Boot
Passkeys are winning, but security leaders must raise the bar
yubico.com·17h
🔐HSM Integration
Italian hotels breached for tens of thousands of scanned IDs
malwarebytes.com·14h
🔤EBCDIC Privacy
Databricks: Recognizing and avoiding security vulnerabilities in vibe coding
heise.de·2d
📜Proof Carrying Code
#TROOPERS25 AD & Entra ID Security Track
insinuator.net·1d
🏺Kerberos Archaeology
Best home security cameras 2025, tried and tested by a tech critic
the-independent.com·15h
🏠Home Automation
Generative AI for Cybersecurity of Energy Management Systems: Methods, Challenges, and Future Directions
arxiv.org·1d
🔍Vector Forensics
Show HN: CCCP – a programmable, context-aware compression protocol (early stage)
github.com·1d·
Discuss: Hacker News
🌊Streaming Compression
Demystifying the (In)Security of QR Code-based Login in Real-world Deployments
usenix.org·3d
🛡️WASM Sandboxing
The Assured Satellite Hacking CTF Challenge at Security Fest 2025
assured.se·1d
📼Cassette Hacking
Using Security Expertise to Bridge the Communication Gap
darkreading.com·17h
🎯Threat Hunting
Typhoon-adjacent Chinese crew broke into Taiwanese web host
theregister.com·9h
🕵️Penetration Testing
Surge in Compromised Credentials in 2025
zimperium.com·18h
🛡Cybersecurity
Loading...Loading more...
AboutBlogChangelogRoadmap