🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Systems Hardening
Ratcheting to zero: How incremental constraints eliminate technical debt
testdouble.com·2d
⚡Incremental Computation
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.com·19h
🎯Threat Hunting
A Standard for Human-Centered Investigation Playbooks
chrissanders.org·10h
🎯Threat Hunting
C++ Seeding Surprises (2015)
pcg-random.org·13h·
Discuss: Hacker News
🔢Bitwise Algorithms
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·22h
📋Protocol Buffers
SUSE Linux Enterprise Server 15 SP7 Launches
techstrong.it·13h·
Discuss: Hacker News, r/linux
🏠Homelab Preservation
The Rise of Security Augmentation (2022)
strategyofsecurity.com·2d·
Discuss: Hacker News
🔐Capability Systems
Resilience assessment framework for cyber-physical distribution power system based on coordinated cyber-physical attacks under dynamic game
arxiv.org·1d
🤝Consensus Algorithms
Ubuntu disables Intel GPU security mitigations, promises 20% performance boost
arstechnica.com·9h
🛡️RISC-V Security
Fear of deployments is the largest tech debt
aviator.co·7h·
Discuss: Hacker News
❄️Nix Adoption
Treasure Case Sharing of HarmonyOS 5 Development — Practical Tips for Application Architecture
dev.to·7h·
Discuss: DEV
🔌Interface Evolution
Design high-confidence computers using trusted instructional set architecture and emulators
arxiv.org·2d
🧪Hardware Fuzzing
The collective waste caused by poor documentation
shanrauf.com·1d·
Discuss: Hacker News
📦Deflate
Critical Security Importance Digital Age Web Techniques(1750818928214500)
dev.to·1d·
Discuss: DEV
🔒WASM Capabilities
Ubuntu Fundamentals: release
dev.to·1d·
Discuss: DEV
❄️Nix Adoption
Slashing CI Costs at Uber
uber.com·19h·
Discuss: Hacker News
🔄Reproducible Builds
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.org·2d
⚔️Lean Tactics
Toward Decision-Oriented Prognostics: An Integrated Estimate-Optimize Framework for Predictive Maintenance
arxiv.org·1d
🌡️Preservation Entropy
Comparing Rust, JavaScript and Go for Authoring WASM Components
obeli.sk·21h·
Discuss: Hacker News
🧩WASM Modules
RepuNet: A Reputation System for Mitigating Malicious Clients in DFL
arxiv.org·1h
🔍BitFunnel
Loading...Loading more...
AboutBlogChangelogRoadmap