๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ Topological Codes

Surface Codes, Homological Error Correction, Quantum Preservation, Information Topology

Implement EIP-7730 today
blog.trailofbits.comยท10h
๐Ÿ”คEBCDIC Privacy
What's the best practice to store config?
reddit.comยท14hยท
Discuss: r/golang
๐Ÿ”„Sync Engine
The Day I Logged in with a Hash
gsociety.frยท3dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Inside Zig's New Writer
joegm.github.ioยท6hยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ’งLiquid Types
Making MCP Tool Use Feel Natural with Context-Aware Tools
ragie.aiยท1dยท
Discuss: Hacker News
๐Ÿ”—Constraint Handling
Make and SQL: An old new way for Data Science workloads
vasvir.wordpress.comยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Many hate on Object-Oriented Programming. But some junior programmers seem to mostly echo what they've heard experienced programmers say. In this blog post I tr...
zylinski.seยท21hยท
Discuss: Hacker News, r/programming
๐Ÿ”ฉSystems Programming
How to use GitHub Copilot on github.com: A power userโ€™s guide
github.blogยท5h
๐ŸŒฟgit
Detecting and countering misuse of AI: August 2025
anthropic.comยท21hยท
Discuss: Hacker News
๐Ÿ•ต๏ธVector Smuggling
Wayland Compositors โ€“ Why and How to Handle Privileged Clients (2014)
mupuf.orgยท2dยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
R0AR Chain Launches Public Node Sale Following $1 Million Whitelist Success
hackernoon.comยท1d
๐Ÿ”—Hash Chains
TaMaRa: Towards a Triple Modular Redundancy Pass for Yosys
blog.yosyshq.comยท3dยท
Discuss: Lobsters, Hacker News
๐Ÿ”FPGA Verification
Implementing Forth in Go and C
eli.thegreenplace.netยท17hยท
Discuss: Lobsters, Hacker News, Hacker News, r/programming
๐Ÿ”—Concatenative Programming
Platoโ€™s Cave and the Shadows of Data
towardsdatascience.comยท1d
๐ŸŒArchive Topology
Who are you again? Infosec experiencing 'Identity crisis' amid rising login attacks
theregister.comยท11hยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
FOSSAI: An Open-Source Manifesto Against Digital Inequality โ€” v0.1
dev.toยท18hยท
Discuss: DEV
๐ŸŒCultural Computing
RotaTouille: Rotation Equivariant Deep Learning for Contours
arxiv.orgยท2d
๐ŸŒ€Riemannian Computing
Mechanical confinement governs phenotypic plasticity in melanoma
nature.comยท5h
๐ŸงฌCopy Number Variants
OAuth Device Flow Vulnerabilities: Analysis of 2024-2025 Attack Wave
guptadeepak.comยท2hยท
Discuss: DEV, Hacker News
๐ŸŽซKerberos Attacks
Interpretable Early Failure Detection via Machine Learning and Trace Checking-based Monitoring
arxiv.orgยท1d
๐Ÿ”งHardware Verification
Loading...Loading more...
AboutBlogChangelogRoadmap