πΏοΈ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Security Engineering
Authentication, Authorization, Encryption, Threat Modeling
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
The New Bar for Engineers in 2025: AI-Native or Behind
zachwills.net
Β·
4h
Β·
Discuss:
Hacker News
π‘
Entrepreneurship
Piramidal (YC W24) Is Hiring a Full Stack Engineer
ycombinator.com
Β·
1d
Β·
Discuss:
Hacker News
π‘
Entrepreneurship
Tactical Trust (1 of 2): Platform Crypto for Developers
tiemoko.com
Β·
2d
Β·
Discuss:
Hacker News
π
Post-Quantum Cryptography
Door Wide AI: The 64M Users McDonald's Left Behind
vitraag.com
Β·
1h
Β·
Discuss:
Hacker News
π€
AI
Coding with LLMs in the summer of 2025 (an update)
antirez.com
Β·
18h
Β·
Discuss:
Lobsters
,
Hacker News
,
r/programming
πΈοΈ
WASM
What do I need to do before throwing away old tech?
rnz.co.nz
Β·
9h
Β·
Discuss:
Hacker News
π
Post-Quantum Cryptography
The old Caveman Chemistry website
cavemanchemistry.com
Β·
15h
Β·
Discuss:
Hacker News
π
Data Engineering
Why it's hard to make settings for high-stakes control research
lesswrong.com
Β·
2d
ποΈ
Observability
API Security in IAM: Architecture, Best Practices, and Threat Mitigation
guptadeepak.com
Β·
3d
Β·
Discuss:
Hacker News
π
API Design
Responsible AI in Enterprise Applications: A Practitioner's View
jjude.com
Β·
14h
Β·
Discuss:
Lobsters
,
Hacker News
ποΈ
Technical Architecture
Google DeepMind Formal Conjectures
google-deepmind.github.io
Β·
11h
Β·
Discuss:
Hacker News
π€
AI
ToolShell Mass Exploitation (CVE-2025-53770)
research.eye.security
Β·
8h
Β·
Discuss:
Hacker News
π’
DevOps Automation
Portable Forensics with Toby: A Raspberry Pi Toolkit
bakerstreetforensics.com
Β·
8h
Β·
Discuss:
Hacker News
ποΈ
Observability
Rethinking MCP or Tool Calling Through Permission Based System
shivasurya.me
Β·
16h
Β·
Discuss:
Hacker News
ποΈ
Observability
Hacker Machine Shop Tutorials
github.com
Β·
12h
Β·
Discuss:
Hacker News
πΈοΈ
WASM
MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles
usenix.org
Β·
1d
Β·
Discuss:
Hacker News
π
Post-Quantum Cryptography
I Spy: Escalating to Entra ID's Global Admin with a First-Party App
securitylabs.datadoghq.com
Β·
13h
Β·
Discuss:
Hacker News
π
Post-Quantum Cryptography
My Ultimate Self-hosting Setup
codecaptured.com
Β·
2d
Β·
Discuss:
Lobsters
,
Hacker News
,
r/selfhosted
ποΈ
System Design
Social Capital: The Compound Interest of Your Engineering Career
newsletter.rafapaez.com
Β·
10h
Β·
Discuss:
Hacker News
π‘
Entrepreneurship
Dear Sam Altman
news.ycombinator.com
Β·
8h
Β·
Discuss:
Hacker News
π€
AI
Loading...
Loading more...
Page 2 »