Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
encryption, ciphers, cryptanalysis, PKI, hash functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187179
posts in
25.8
ms
Data Protection on AWS: Building an End-to-End Encryption Strategy for S3,
RDS
, and
Lambda
🪝
eBPF
medium.com
·
3d
GnuPG
introduces support for post-quantum crypto
encryption
& 64-bit Windows improvements
🪝
eBPF
alternativeto.net
·
3d
Quantum
Computers
Are Coming to Break
Cryptography
Faster Than Anyone Expected
✅
Formal Verification
singularityhub.com
·
3d
Quantum
Computers
Are Not A Threat To 128-bit
Symmetric
Keys
✅
Formal Verification
lemmy.world
·
4d
SSH vs
SSL/TLS
— Lessons I Learned While Studying Cybersecurity and Solving Labs
✅
Formal Verification
infosecwriteups.com
·
4d
Show HN: Quantum Temporal
Cryptography
– spec for
interplanetary
trust chains
✅
Formal Verification
zenodo.org
·
5d
·
Hacker News
What is a
passkey
, how does it work and why is it better than a
password
?
🪝
eBPF
theguardian.com
·
6d
·
Hacker News
The FBI Says
Warrant-Proof
Encryption
Is A Public Safety Problem - Here's What It Means
🪝
eBPF
slashgear.com
·
3d
krb5
_
allow
_weak_crypto (3) Linux Manual Page
🪝
eBPF
systutorials.com
·
6d
Digital Shield:
Re-architecting
the
Hardcore
Security Paradigm in the Battle for Web3 Asset…
🔌
Networking
medium.com
·
6d
Prime-Field
PINI
: Machine-Checked Composition
Theorems
for Post-Quantum NTT Masking
✅
Formal Verification
arxiv.org
·
1d
GitHub
Dorking
: The Complete 2026 Hunter’s Guide to Finding
Exposed
Secrets
🪝
eBPF
medium.com
·
6d
The Accidental
Ancestor
— How a Computer for
Verifying
Numbers Shaped Modern Hashing
🗄️
Database Internals
0xkrt26.github.io
·
3d
·
Hacker News
VLAN
Segmentation:
Securing
IoT Devices from the Main Network
🪝
eBPF
valtersit.com
·
6d
·
DEV
IPv7
: Identity-Centric Network Protocol for Security, Proxy Mitigation, and
Operability
🪝
eBPF
datatracker.ietf.org
·
5d
·
Hacker News
Software
🪝
eBPF
news.ycombinator.com
·
3d
·
Hacker News
Training Machine Learning Models on
Encrypted
Data: A Privacy-Preserving Framework using
Homomorphic
Encryption
✅
Formal Verification
arxiv.org
·
2d
OSINT
Tools for Cybersecurity: A
Practical
Guide for Security Teams
🪝
eBPF
socradar.io
·
6d
Hacking
Policy for the Public Good
🪝
eBPF
youtube.com
·
6d
An
Unsolved
Cipher
✅
Formal Verification
futilitycloset.com
·
3d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help