Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Computer Security
Threat Modeling, Vulnerability Analysis, Secure Coding, Encryption
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
5773
posts in
13.2
ms
Tape Street – Adaptive Encryption via
Kinetic
Cryptography
🔢
Homomorphic Encryption
github.com
·
3d
·
Hacker News
Author's
preface
to the book: "
PGP
Source Code and Internals" (1995)
🔐
Cryptography
philzimmermann.com
·
1d
·
Hacker News
Quantum computer researchers: Bitcoin
encryption
breakable
in a few years
🔢
Homomorphic Encryption
heise.de
·
5d
·
Hacker News
A hacker has allegedly breached one of China’s
supercomputers
and is attempting to sell a
trove
of stolen data
🤖
Cyberpunk
cnn.com
·
21h
·
Hacker News
,
r/China
Securing
AI &
Agentic
Applications
🤖
AI agents
billdx.github.io
·
2d
·
Hacker News
ESP32-S3
gets post-quantum encryption with
Aethyr
Edge Node open-source firmware
🛡️
Authenticated Encryption
cnx-software.com
·
3d
·
Hacker News
I Built a
Wiki
LLM
⚙️
Ansible
99helpers.com
·
1d
·
Hacker News
DeepMind's paper on
p0wning
Claws
and what we learned
🐛
Fuzzing
suthakamal.substack.com
·
1d
·
Substack
aethyrai/esp32-awp-edge
: Post-quantum encrypted IoT edge node for ESP32-S3. ML-KEM-768 key exchange, BLAKE3 integrity,
XChaCha20-Poly1305
encryption. Formally verified. 2.1s cold boot to PQC session.
🛡️
Authenticated Encryption
github.com
·
6d
·
Hacker News
Assessing
Claude
Mythos
Preview's cybersecurity capabilities
🔓
Binary Exploitation
red.anthropic.com
·
1d
·
Lobsters
,
Hacker News
,
r/netsec
,
r/singularity
On LLMs and
Vulnerability
Research
🚀
MLOps
devansh.bearblog.dev
·
2d
A.I. Is on Its Way to
Upending
Cybersecurity
🤖
Cyberpunk
nytimes.com
·
2d
·
Hacker News
Automated
Security
Assertion
Generation Using LLMs (U. of Florida)
∀
Lean4
semiengineering.com
·
5d
We
parsed
1,031 WA breach
filings
. Malware hides 5x longer than ransomware
🌐
Network Security
ciphercue.com
·
1d
·
Hacker News
Offensive
Cybersecurity Time
Horizons
⏳
Time-travel Databases
lyptusresearch.org
·
5d
·
Lobsters
NSA
and
IETF
, part 7
🔐
Cryptography
blog.cr.yp.to
·
3d
·
Hacker News
Simplifying
MBA
obfuscation
with CoBRA
∀
Lean4
blog.trailofbits.com
·
5d
·
Lobsters
,
Hacker News
Securing AI infrastructure to prevent
backdoors
and
sabotage
🏠
Self-hosted AI
the-substrate.net
·
3d
·
Hacker News
My
self-sovereign
/ local / private / secure LLM
setup
, April 2026
👨💻
Self-Hosting
vitalik.eth.limo
·
6d
·
Hacker News
,
Hacker News
hamzamiladin/Vulnchain
: AI-powered multi-language security scanner: 154 Semgrep rules, 13 Joern CPG scripts, AI code detection, and attack-chain correlation
🔍
Static Analysis
github.com
·
2d
·
Hacker News
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help