Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
midas's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82870
posts in
787.7
ms
Loading...
Subscribe
Quantum 4 questions
cloudynights.com
·
1d
🔐
cryptography
New
ransomware
spotted with a 'coding mistake' that means even the hackers can't
decrypt
the files
pcgamer.com
·
1d
🔐
cryptography
Google
reclassifies
as a Data Processor for
reCAPTCHA
thomasrigby.com
·
1d
🔐
cryptography
The anti-Bayesian is standing at the back window with a shotgun, scanning for priors coming over the hill, while a million assumptions just walk right into his house through the front door. (also, an interesting point by
Yann
LeCun
about human language)
statmodeling.stat.columbia.edu
·
1d
🔐
cryptography
Stop
Hashing
Passwords: A Practical Step-by-Step
Passkey
Tutorial
dev.to
·
5d
·
Discuss:
DEV
🔐
cryptography
How I Built My Project in
Haskell
dev.to
·
8h
·
Discuss:
DEV
🔐
cryptography
llOOPy
lOOPs (Dave
Jarvis
)
dave.autonoma.ca
·
2d
🔐
cryptography
Beyond Point
Particles
-- Extended Structural Dynamics and the H
Theorem
arxiv.org
·
4d
⚛
physics
Confide
: Encrypted,
ephemeral
and screenshot-proof messenger
getconfide.com
·
3d
·
Discuss:
Hacker News
🔐
cryptography
Podcast
Spotlight
: The Threat from Quantum
Computers
assured.se
·
2d
🔐
cryptography
Quantum encryption could work across
city-sized
distances
scimex.org
·
2d
🔐
cryptography
Theory-independent monitoring of the
decoherence
of a superconducting qubit with generalized
contextuality
nature.com
·
22h
🔐
cryptography
**Abstract:** This paper introduces a novel framework, Automated Protocol Verification and Optimization via Multi-Modal Data Fusion and
Recursive
HyperScore
...
freederia.com
·
1d
🔐
cryptography
Game of Coding for
Vector-Valued
Computations
arxiv.org
·
3d
🔐
cryptography
*Quantum‑Resistant Cryptographic Hash Functions Based on the
Colored
Jones Polynomial of
Knots
*
freederia.com
·
2d
🔐
cryptography
Samsar4/Ethical-Hacking-Labs
: Practical
Ethical
Hacking Labs 🗡🛡
github.com
·
1d
🔐
cryptography
Wavelength-multiplexed
decoy-state
quantum key distribution with advantage distillation
link.aps.org
·
1d
🔐
cryptography
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Let
Lambda
Come Over
yamlscript.org
·
1d
🔐
cryptography
Performance Tip of the Week #83:
Reducing
memory
indirections
abseil.io
·
10h
🔐
cryptography
Tip of the Week #158:
Abseil
Associative
containers and contains()
abseil.io
·
10h
🔐
cryptography
Loading...
Loading more...
« Page 6
•
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help