๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Swedish Cryptography

Regional Security Research, Nordic Standards, Cultural Encryption, Scandinavian Innovation

We used AI to analyse three cities. Itโ€™s true: we now walk more quickly and socialise less | Carlo Ratti
theguardian.comยท9h
๐ŸŒCultural Algorithms
Phishing training is pretty pointless, researchers find
scworld.comยท7hยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
This Website is Served from Nine Neovim Buffers on My Old ThinkPad
vim.gabornyeki.comยท11hยท
Discuss: Lobsters, Hacker News, r/neovim
๐Ÿ•ธ๏ธWASM Archives
GulliVR: A Walking-Oriented Technique for Navigation in Virtual Reality Games Based on Virtual Body Resizing
arxiv.orgยท18h
๐Ÿ“ŸTerminal Physics
Protect Yourself From Data Breaches: Why You Should Use a Password Manager
hackernoon.comยท3d
๐Ÿ”“Hacking
IPG: Incremental Patch Generation for Generalized Adversarial Patch Training
arxiv.orgยท18h
โšกIncremental Computation
DigiPaws: An app designed to help users reduce screen addiction
github.comยท4hยท
Discuss: Hacker News
๐ŸงFOSS
Approximating the universal thermal climate index using sparse regression with orthogonal polynomials
arxiv.orgยท18h
๐Ÿ“Error Bounds
TinyTim: A Family of Language Models for Divergent Generation
arxiv.orgยท18h
๐ŸŒ€Brotli Internals
Benchmarking Prosody Encoding in Discrete Speech Tokens
arxiv.orgยท18h
๐ŸŽงLearned Audio
Noodlophile Stealer Hides Behind Bogus Copyright Complaints
darkreading.comยท2h
๐ŸŽซKerberos Attacks
Beyond the binary: Nuanced categories of good, neutral and bad support lasting human cooperation
phys.orgยท6h
๐ŸคConsensus Networks
Securityโ€™s blind spot: the problem with taking CVE scores at face value
techradar.comยท14h
๐Ÿ”“Hacking
Grab-n-Go: On-the-Go Microgesture Recognition with Objects in Hand
arxiv.orgยท18h
โœ‹Tactile Computing
The Constraint Satisfaction Problem Over Multisorted Cores
arxiv.orgยท18h
๐ŸŽจGraph Coloring
Automating the Derivation of Unification Algorithms: A Case Study in Deductive Program Synthesis
arxiv.orgยท18h
๐Ÿ”ฎProof Search
How Tenable Moved From Siloed Security to Exposure Management
tenable.comยท9h
๐ŸŽฏThreat Hunting
Von Neumann's minimax theorem through Fourier-Motzkin elimination
arxiv.orgยท18h
๐ŸŽฏPerformance Proofs
Automated Gel Electrophoresis Anomaly Detection via Multi-Modal Pattern Fusion
dev.toยท1dยท
Discuss: DEV
๐Ÿ‘๏ธOCR Enhancement
Millions of dollars in cryptocurrency has been confiscated as the DoJ cracks down on an infamous ransomware operator
techradar.comยท2h
๐ŸŽซKerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap