🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔒 WASM Capabilities

Object Capabilities, Sandboxing, Security Models, Module Composition

How to Speed Up TPRM Approvals with Spectra Assure
reversinglabs.com·6h
🔒Hardware Attestation
Replacing Client-side JavaScript SDKs with WebAssembly Components at the Edge
fastly.com·1d·
Discuss: Hacker News
🕸️WebAssembly
Designing Permission Middleware in Axum: Manual vs Automatic Approaches
reddit.com·10h·
Discuss: r/rust
🔒Linear Types
Small language model for secrets detection
wiz.io·2d·
Discuss: Hacker News
💻Local LLMs
How to Quantify Risk and Communicate Effectively: Step 4 to TruRisk™
blog.qualys.com·3h
🎯Threat Hunting
The collective waste caused by poor documentation
shanrauf.com·16h·
Discuss: Hacker News
📦Deflate
What LLMs Know About Their Users
schneier.com·7h·
Discuss: Hacker News
💻Local LLMs
C compiler for Web Assembly (c4wa)
github.com·1d·
Discuss: Hacker News
🌐WASI
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.to·5h·
Discuss: DEV
🔐Homomorphic Encryption
Web Numbers
ar.al·3h·
Discuss: Hacker News
📡DNS Archaeology
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750830996145900)
dev.to·12h·
Discuss: DEV
🌐Network Protocols
Critical Security Importance Digital Age Web Techniques(1750777701670000)
dev.to·1d·
Discuss: DEV
🛡️WebAssembly Security
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·11h
📋Protocol Buffers
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.com·3h·
Discuss: Hacker News
📋DFDL
Machine Learning Fundamentals: accuracy with python
dev.to·1d·
Discuss: DEV
👁️Observatory Systems
Does "XBOW AI Hacker" Deserve the Hype?
utkusen.substack.com·1h·
Discuss: Substack
🔓Hacking
Containers are available in public beta for simple, and programmable compute
blog.cloudflare.com·1d·
Discuss: Hacker News
📦Container Security
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.org·1d
⚔️Lean Tactics
LASA: Enhancing SoC Security Verification with LLM-Aided Property Generation
arxiv.org·1d
🔍FPGA Verification
The Agent Testing Pyramid
rchaves.app·1h·
Discuss: Hacker News
🔍Concolic Testing
Loading...Loading more...
AboutBlogChangelogRoadmap