🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ ZFS Checksums

Data Integrity, Scrubbing, Silent Corruption Detection, Block Verification

Security data updates in Sequoia and Tahoe
eclecticlight.co·23h
🔐HSM Integration
Measuring the OneWeb satellite network
blog.apnic.net·5h
📡Network Protocol Design
Updated Debian 12: 12.12 released
debian.org·3d
❄️Nix Flakes
Crack the Program, Win a Book
crackmes.one·1d·
Discuss: Hacker News
🔓Password Cracking
An Introduction to XForms
xml.com·15h·
Discuss: Hacker News
🐚Shell Calculus
A Curated List of CLI Commands for Google's Gemini CLI Coding Agent
dotgemini.dev·1d·
Discuss: Hacker News
📟CLI Design
Pulling an Inverse Conway Maneuver at Netflix (2023)
jivimberg.io·1d·
Discuss: Hacker News
🌊Streaming Systems
'Make invalid states representable' considered harmful
seangoedecke.com·2d·
Discuss: Lobsters, Hacker News, r/programming
🛡️Preservation Proofs
Major attack on node.js
heise.de·22h
🔓Hacking
JFrog Continues Leaping at SwampUP
devops.com·14h
🔓Open Source Software
Matmul on Blackwell: Part 2 – Using Hardware Features to Optimize Matmul
modular.com·4d·
Discuss: Hacker News
⚡SIMD Optimization
typical: Data interchange with algebraic data types.
github.com·2d
📋Format Specification
Top Bito AI Code Review Alternatives for 2025
dev.to·1h·
Discuss: DEV
📏Code Metrics
Flatline TryHackMe Walkthrough — Complete Step-by-Step Guide to Root
infosecwriteups.com·2d
🎯NTLM Attacks
Host Header Injection - silverstripecmsv6.0.0
seclists.org·1d
🌐DNS Security
CVE-2025–24204: Apple macOS Entitlement Flaw Enables Memory Dump, Keychain Theft, and FairPlay…
infosecwriteups.com·1d
👑RISC-V Privilege
Automated Standardized Protocol Validation via Hybrid Symbolic & Statistical Analysis
dev.to·2d·
Discuss: DEV
🌐NetworkProtocols
XSS in Google IDX Workstation → RCE! $22,500 Bounty Earned
infosecwriteups.com·1d
🌐DNS Security
Automated Analysis of Metamorphic Rock Textures for Enhanced Resource Prospecting
dev.to·12h·
Discuss: DEV
🏺Computational Archaeology
Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic Shift
arxiv.org·1d·
Discuss: Lobsters
🌳Archive Merkle Trees
Loading...Loading more...
AboutBlogChangelogRoadmap