🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Swedish Cryptography

Regional Security Research, Nordic Standards, Cultural Encryption, Scandinavian Innovation

Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.comΒ·1d
🎫Kerberos Attacks
Podcast on building security that lasts: Microsoft’s journey towards durability at scale
microsoft.comΒ·6h
πŸ’ΎPersistence Strategies
Show HN: What it took to make QKD work in RAM
qsymbolic.comΒ·11hΒ·
Discuss: Hacker News
πŸ”Quantum Security
Interview with Jon Gjengset: Defending Democracies with Rust
filtra.ioΒ·1dΒ·
Discuss: Hacker News
πŸ¦€Embedded Rust
A CRDT-based Messenger in 12 Lines of Bash Using a Synced Folder
holdtherobot.comΒ·16hΒ·
Discuss: Lobsters, Hacker News, Hacker News
πŸ”€CRDT
Networking for Systems Administrators
mwl.ioΒ·1dΒ·
Discuss: Hacker News
🌐DNS over QUIC
Structured data response with Amazon Bedrock: Prompt Engineering and Tool Use
aws.amazon.comΒ·8h
πŸŒ€Brotli Internals
The Year of Quantum: From concept to reality in 2025
mckinsey.comΒ·5hΒ·
Discuss: Hacker News
βš›οΈQuantum Tape
Next Generation High Web Rust Based Solutions(1750916331932500οΌ‰
dev.toΒ·18hΒ·
Discuss: DEV
πŸ”ŒInterface Evolution
Why World's New 'Priority Lane' for Humans on the Blockchain Could Change Everything
hackernoon.comΒ·8h
🀝Distributed Consensus
Here is a creative heading for the blog post: "The Phantom Hackers: Unmasking the Invisible Foes of
dev.toΒ·7hΒ·
Discuss: DEV
πŸ›‘Cybersecurity
Networks aren’t fragile because of change, they’re fragile because they change without structure
techradar.comΒ·1d
πŸ€–Network Automation
Critical Security Importance Digital Age Web Techniques(1750777701670000οΌ‰
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”’WASM Capabilities
How to Write a Software Project Proposal: Complete Template & Guide
dev.toΒ·18hΒ·
Discuss: DEV
πŸ¦‹Format Metamorphosis
Add Single-sign-on To Your Applications With Keycloak and Learn... Takashi Norimatsu & Marek Posolda
youtube.comΒ·3h
πŸ”“Open Source Software
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”’WASM Capabilities
The AI Geopolitical Race: A New Frontier in Global Power
dev.toΒ·5hΒ·
Discuss: DEV
πŸ”²Cellular Automata
A Geometric Square-Based Approach to RSA Integer Factorization
arxiv.orgΒ·2d
πŸ”±Galois Cryptography
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.orgΒ·20h
πŸ“„Document Digitization
A Locally Differential Private Coding-Assisted Succinct Histogram Protocol
arxiv.orgΒ·2d
πŸ”Homomorphic Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap