🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ Security Engineering

Authentication, Authorization, Encryption, Threat Modeling

Improving Geographical Resilience For Distributed Open Source Teams with FREON
soatok.blogΒ·12hΒ·
Discuss: Lobsters, Hacker News
πŸ”Post-Quantum Cryptography
Navigating the EU’s new Radio Equipment Directive: how Raspberry Pi provides an industrial advantage
raspberrypi.comΒ·2d
πŸ›οΈTechnical Architecture
[HIRING] Staff / Principal Frontend Engineer β€” Lead Privacy-First Web App Development (Remote, US)
360privacy.bamboohr.comΒ·2dΒ·
Discuss: r/reactjs
πŸ›οΈTechnical Architecture
We can still sleep peacefully β€” or so we thought. Steganography via internal activations is already possible in small language models β€” a potential first step t...
lesswrong.comΒ·23h
πŸ”Post-Quantum Cryptography
Implementing Secure Authentication: Practical Tactics for Digital Identity Defense
guptadeepak.comΒ·2dΒ·
Discuss: DEV, Hacker News
πŸ”Post-Quantum Cryptography
Roo Code Workflow: An Advanced LLM-Powered Development Setup
gist.github.comΒ·11hΒ·
Discuss: Hacker News
πŸ•ΈοΈWASM
Encryption made for police and military radios may be easily cracked
arstechnica.comΒ·23hΒ·
Discuss: r/privacy
πŸ”Post-Quantum Cryptography
Why Fighting Disinformation Needs Resilient Infrastructure
sphericalcowconsulting.comΒ·20hΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Foundry (YC F24) Is Hiring Staff Level Product Engineers
ycombinator.comΒ·2dΒ·
Discuss: Hacker News
πŸ’‘Entrepreneurship
Breaking through the Senior Engineer ceiling
incident.ioΒ·15hΒ·
Discuss: Hacker News
πŸ›οΈTechnical Architecture
MCA student here – confused where to start coding for IT jobs & logic building
reddit.comΒ·1dΒ·
Discuss: r/reactjs
πŸ¦€Rust Systems
The Secret History of Tor: How a Military Project Became a Lifeline for Privacy
thereader.mitpress.mit.eduΒ·2dΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Red Teams Jailbreak GPT-5 with Ease, Warn It's 'Nearly Unusable' for Enterprise
securityweek.comΒ·1dΒ·
Discuss: Hacker News
πŸ€–AI
Beyond good vibes: Securing AI agents by design
yanirseroussi.comΒ·2dΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Classification of the Approaches to the Technological Resurrection
academia.eduΒ·1hΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Logarithmic mean energy optimization a metaheuristic algorithm
nature.comΒ·2hΒ·
Discuss: Hacker News
πŸ‘οΈObservability
Microsoft POML – Prompt Orchestration Markup Language
github.comΒ·4hΒ·
Discuss: Hacker News
πŸ•ΈοΈWASM
Keep the Terminal Relevant: Patterns for AI Agent Driven CLIs – InfoQ
infoq.comΒ·11hΒ·
Discuss: Hacker News
🚒DevOps Automation
Hackers Went Looking for a Backdoor in High-Security Safesβ€”and Now Can Open Them in Seconds
wired.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Consent and Compromise
research.eye.securityΒ·1dΒ·
Discuss: Hacker News, Hacker News
πŸ›οΈTechnical Architecture
Loading...Loading more...
AboutBlogChangelogRoadmap