๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Swedish Cryptography

Regional Security Research, Nordic Standards, Cultural Encryption, Scandinavian Innovation

Sci-fi interfaces | IxD Lessons from Sci-Fi
scifiinterfaces.comยท17h
๐Ÿ›Digital humanities
Recommended email providers โ€ข Cory Dransfeldt
coryd.devยท1d
๐Ÿ Personal Archives
Auth for business software isn't that similar to auth for consumer software
tesseral.comยท1dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Why Postgres needs better connection security defaults
neon.comยท2dยท
Discuss: Hacker News
๐Ÿ—„๏ธPostgreSQL WAL
Starlink helps eight more nations pass 50 percent IPv6 adoption
theregister.comยท17h
๐ŸŒDNS over QUIC
Redefining Zero Trust in the Age of AI Agents and Agentic Workflows
blogs.cisco.comยท1d
๐Ÿ”’Language-based security
How Language Became Infrastructureโ€”and Why That Should Worry Us
hackernoon.comยท1d
๐Ÿ“‹Document Grammar
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.orgยท1d
๐Ÿ“ƒManuscript Tokenization
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.toยท2dยท
Discuss: DEV
๐Ÿ”’WASM Capabilities
A Geometric Square-Based Approach to RSA Integer Factorization
arxiv.orgยท3d
๐Ÿ”ฑGalois Cryptography
Introducing Zenoscript
dev.toยท2hยท
Discuss: DEV
๐ŸŽฏGradual Typing
SSO Security Exposed: Real-World Attack Scenarios in 2025
dev.toยท4hยท
Discuss: DEV
๐ŸŽซKerberos Attacks
Add Single-sign-on To Your Applications With Keycloak and Learn... Takashi Norimatsu & Marek Posolda
youtube.comยท1d
๐Ÿ”“Open Source Software
CBF-AFA: Chunk-Based Multi-SSL Fusion for Automatic Fluency Assessment
arxiv.orgยท1d
๐ŸŽ™๏ธWhisper
Cybercriminals are abusing LLMs to help them with hacking activities
techradar.comยท6h
๐Ÿ”“Hacking
Hackers are using fake Zoom apps to steal your data and your cryptowallet - here's how to stay safe
techradar.comยท1d
๐Ÿ”“Hacking
Why I Think Decentralized AI Can Be A Game Changer For The Future Of AI?
dev.toยท15hยท
Discuss: DEV
โšกProof Automation
Floating-Point Data Transformation for Lossless Compression
arxiv.orgยท3d
๐ŸŒŠStreaming Compression
US Falling Behind China in Exploit Production
darkreading.comยท9h
๐Ÿ›กCybersecurity
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
blog.checkpoint.comยท1d
๐ŸŽฏThreat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap