Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
midas's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82911
posts in
743.8
ms
Loading...
Subscribe
Wordle
but with two secret words that have have no
letters
in common
xordle.org
·
1d
🔐
cryptography
Open
Molten
Claw
idiallo.com
·
1d
·
Discuss:
Hacker News
🔐
cryptography
A
Novelist
Derives
Physics–Crime Duality
link.aps.org
·
1d
⚛
physics
A
superfluid
freezes
and breaks the rules of physics
sciencedaily.com
·
2d
⚛
physics
Microsoft Releases
Crescent
Cryptographic
Library
i-programmer.info
·
2d
🔐
cryptography
FOSDEM
2026
hack.org
·
1d
🔐
cryptography
What Ultimately Is There? <br>
Metaphysics
and the
Ruliad
writings.stephenwolfram.com
·
3d
⚛
physics
Text classification with Python 3.14's
zstd
module • Max
Halford
maxhalford.github.io
·
2d
·
Discuss:
Lobsters
,
Hacker News
🔐
cryptography
**Pulse‑Sequence Tuning for Fault‑Tolerant
Exponentiation
in
Shor
’s Algorithm on Transmon Qubits**
dev.to
·
8h
·
Discuss:
DEV
🔐
cryptography
Logistic
Regression, Average Marginal Effects, and the Linear Probability Model - Part II:
Coefficients
and AMEs of nested models
elff.eu
·
1d
🔐
cryptography
A (
collective
)
genius
hits a target no one else can see
metafilter.com
·
1d
🔐
cryptography
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
·
2d
🔐
cryptography
ClawHavoc
: 341 Malicious
Clawed
Skills Found by the Bot They Were Targeting
koi.ai
·
2d
·
Discuss:
Hacker News
🔐
cryptography
The
Agentic
Trust Framework: Zero Trust
Governance
for AI Agents
cloudsecurityalliance.org
·
3d
·
Discuss:
Hacker News
🔐
cryptography
Tighter Asymptotic Key Rates for Intensity-Correlated
Decoy-State
QKD
via Nonlinear Programming
arxiv.org
·
2d
🔐
cryptography
MindsEye
Series: Google Edition - Building YouTube's
Cognitive
Infrastructure
dev.to
·
10h
·
Discuss:
DEV
🔐
cryptography
Spectral Approximation and Probabilistic Verification of Non‑trivial Zeros of
Rankin
–
Selberg
L‑Functions on GL(3) via Random Matrix Ensembles and Bayesian Inference
freederia.com
·
1d
🔐
cryptography
qzxcvbn/Csa
: THE SOVEREIGN ACCESS CONSTANT (
CsaC
_{sa} Csa) A Universal Open Standard for Passwordless, Zero-Knowledge Internet & Device Authentication
github.com
·
2d
·
Discuss:
Hacker News
🔐
cryptography
Telling the Story of
Chameleon
Hash
Functions: A 27-Year Review
eprint.iacr.org
·
3d
🔐
cryptography
DFlash
: Block Diffusion for Flash
Speculative
Decoding
arxiv.org
·
2d
🔐
cryptography
Loading...
Loading more...
« Page 7
•
Page 9 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help