Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
encryption, ciphers, cryptanalysis, PKI, hash functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186448
posts in
27.8
ms
Catching
the Fly: Practical Challenges in Making Blockchain
FlyClient
Real
💥
Exploit Development
arxiv.org
·
20h
GnuPG
introduces support for post-quantum crypto
encryption
& 64-bit Windows improvements
🔧
Hardware Hacking
alternativeto.net
·
3d
Quantum
Computers
Are Coming to Break
Cryptography
Faster Than Anyone Expected
🎭
Social Engineering
singularityhub.com
·
3d
Show HN: Quantum Temporal
Cryptography
– spec for
interplanetary
trust chains
🛠️
Ghidra
zenodo.org
·
5d
·
Hacker News
Quantum
Computers
Are Not A Threat To 128-bit
Symmetric
Keys
🐛
Fuzzing
lemmy.world
·
4d
SSH vs
SSL/TLS
— Lessons I Learned While Studying Cybersecurity and Solving Labs
📡
Network Security
infosecwriteups.com
·
4d
What is a
passkey
, how does it work and why is it better than a
password
?
🕵️
Hacking
theguardian.com
·
6d
·
Hacker News
krb5
_
allow
_weak_crypto (3) Linux Manual Page
⚙️
Binary Exploitation
systutorials.com
·
6d
The FBI Says
Warrant-Proof
Encryption
Is A Public Safety Problem - Here's What It Means
📡
Network Security
slashgear.com
·
3d
Digital Shield:
Re-architecting
the
Hardcore
Security Paradigm in the Battle for Web3 Asset…
🛡️
Cybersecurity
medium.com
·
6d
The Accidental
Ancestor
— How a Computer for
Verifying
Numbers Shaped Modern Hashing
🔧
Hardware Hacking
0xkrt26.github.io
·
3d
·
Hacker News
GitHub
Dorking
: The Complete 2026 Hunter’s Guide to Finding
Exposed
Secrets
💥
Exploit Development
medium.com
·
6d
Prime-Field
PINI
: Machine-Checked Composition
Theorems
for Post-Quantum NTT Masking
🐛
Fuzzing
arxiv.org
·
1d
Software
💿
software
news.ycombinator.com
·
3d
·
Hacker News
IPv7
: Identity-Centric Network Protocol for Security, Proxy Mitigation, and
Operability
📡
Network Security
datatracker.ietf.org
·
5d
·
Hacker News
VLAN
Segmentation:
Securing
IoT Devices from the Main Network
📡
Network Security
valtersit.com
·
6d
·
DEV
Privacy-first mind
mapping
app. Part 3:
Encryption
Model
🌐
Web App Security
mindmapvault.com
·
6d
·
DEV
An
Unsolved
Cipher
🛠️
Ghidra
futilitycloset.com
·
3d
Training Machine Learning Models on
Encrypted
Data: A Privacy-Preserving Framework using
Homomorphic
Encryption
🐛
Fuzzing
arxiv.org
·
2d
Hacking
Policy for the Public Good
🎭
Social Engineering
youtube.com
·
6d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help