๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ Vector Smuggling

Embedding Exfiltration, Covert Channels, Data Hiding, ML Security

Context engineering
simonwillison.netยท1d
๐Ÿ”Archive Semantics
Digital Forensics Round-Up, June 25 2025
forensicfocus.comยท3d
๐Ÿ”ฌArchive Forensics
VeilNet Built on Pion WebRTC, Replacement for Tor and Tailscale
veilnet.orgยท2dยท
Discuss: Hacker News
๐Ÿ“žWebRTC
Thoughts on AI and software development - Part 4
ufried.comยท2d
โšกIncremental Computation
Global Reach โ€” The New Scale of Chinese Cyberthreats
paloaltonetworks.comยท2d
๐ŸŽฏThreat Hunting
The Problem Isnโ€™t Whether The JD Vance Meme Story Is Trueโ€”Itโ€™s That Itโ€™s So Believable After Everything The Trump Regime Has Done
techdirt.comยท1d
๐Ÿ”“Hacking
Security Advisory: Anthropic's Slack MCP Server Vulnerable to Data Exfiltration
embracethered.comยท4dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Phishing wave targets Apobank: practices and pharmacies must be careful
heise.deยท2d
๐ŸŽซKerberos Attacks
Kitab An-Nur โ€“ Preserving human experiences before AI content takes over
news.ycombinator.comยท3hยท
Discuss: Hacker News
๐ŸŒWeb Archiving
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.toยท3dยท
Discuss: DEV
๐Ÿง Machine Learning
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.orgยท3d
๐Ÿ“„Document Digitization
Language Modeling by Language Models
arxiv.orgยท3d
๐Ÿค–Grammar Induction
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols๏ผˆ1751175401040400๏ผ‰
dev.toยท7hยท
Discuss: DEV
๐ŸŒNetwork Protocols
Timed Prediction Problem for Sandpile Models
arxiv.orgยท2d
๐Ÿ”ฒCellular Automata
The Googly way of Making AI Agents
dev.toยท2dยท
Discuss: DEV
โšกProof Automation
Data Compression with Relative Entropy Coding
arxiv.orgยท6d
๐Ÿ“Compression Mathematics
Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis
arxiv.orgยท5d
๐Ÿ”—Hash Chains
Programming Entry Level: tutorial loops
dev.toยท14hยท
Discuss: DEV
๐Ÿ”—Concatenative Programming
APT42 impersonates cyber professionals to phish Israeli academics and journalists
securityaffairs.comยท2d
๐ŸŽซKerberos Attacks
Advancing Artificial Intelligence: Safety, Personalization, and Practical Applications in Recent Research
dev.toยท2dยท
Discuss: DEV
๐Ÿ”ฒCellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap