Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Hardware Security
Physical Security, Trusted Boot, Hardware Keys, Secure Elements
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
6999
posts in
176.1
ms
Building a Hardware
TOTP
Authenticator
on ESP32: The Memory Management Nightmare
github.com
·
8h
·
Discuss:
DEV
🔒
Security
KeyleSSH
: A New PAM Concept for IT
Admins
dev.to
·
2h
·
Discuss:
DEV
🦭
Podman
Exploiting signed
bootloaders
to
circumvent
UEFI Secure Boot
habr.com
·
3d
·
Discuss:
Lobsters
,
Hacker News
🐧
Linux
Installation
xkcd.com
·
22h
🐧
Linux
Can you trust
LastPass
in 2026? Inside the
multimillion-dollar
quest to rebuild its security culture
zdnet.com
·
12h
·
Discuss:
Hacker News
🔒
Security
Anubis
OSS
— Local LLM Benchmarking for Apple Silicon
devpadapp.com
·
2d
·
Discuss:
r/opensource
🚀
Performance
AI agent
sandboxing
in 2026: how to choose between primitives,
runtimes
, and platforms
manveerc.substack.com
·
9h
·
Discuss:
Substack
🦭
Podman
Stable
kernels
for Wednesday
lwn.net
·
13h
🐧
Linux
Microsoft's February Patch Tuesday Update
Fixes
Six Zero-Day
Exploits
lifehacker.com
·
10h
🛡
Vulnerability Management
Everything I know about good system design
seangoedecke.com
·
2d
🗄️
Databases
The Perfect
Device
sometimes.digital
·
10h
·
Discuss:
Hacker News
🔧
Mise
Introducing
QwikChek
: Security
Scanning
Built for Developers
dev.to
·
7h
·
Discuss:
DEV
🛠
Browser DevTools
A Policy-Aware Agent Loop with
Cedar
and
OpenClaw
windley.com
·
11h
📋
Infrastructure as Code (IaC)
Updating the
Expiring
Secure Boot Certificates Is Sure to Go Without a
Hitch
pcper.com
·
1d
·
Discuss:
Hacker News
🛡
Vulnerability Management
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
·
4d
💾
Retro Computing
How to Inspect All
Cron
Jobs on a Linux System: A
Sysadmin
's Guide
geeksta.net
·
15h
·
Discuss:
DEV
🐧
Linux
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
3d
·
Discuss:
Hacker News
🔓
DRM Analysis
From Monolithic
SoCs
To
Chiplets
: A New Hardware Security Paradigm
semiengineering.com
·
6d
💾
Retro Computing
SAST vs DAST vs (
IAST/RASP
): Quick AppSec Checklist
codereviewlab.com
·
1d
·
Discuss:
DEV
🔎
Static Analysis
We Do What
Nintendon
't
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
💾
Retro Computing
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help