🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ Security Engineering

Authentication, Authorization, Encryption, Threat Modeling

Implementing Secure Authentication: Practical Tactics for Digital Identity Defense
guptadeepak.comΒ·1dΒ·
Discuss: DEV, Hacker News
πŸ”Post-Quantum Cryptography
Navigating the EU’s new Radio Equipment Directive: how Raspberry Pi provides an industrial advantage
raspberrypi.comΒ·1d
πŸ›οΈTechnical Architecture
[HIRING] Staff / Principal Frontend Engineer β€” Lead Privacy-First Web App Development (Remote, US)
360privacy.bamboohr.comΒ·2dΒ·
Discuss: r/reactjs
πŸ›οΈTechnical Architecture
We can still sleep peacefully β€” or so we thought. Steganography via internal activations is already possible in small language models β€” a potential first step t...
lesswrong.comΒ·4h
πŸ”Post-Quantum Cryptography
Encryption made for police and military radios may be easily cracked
arstechnica.comΒ·5hΒ·
Discuss: r/privacy
πŸ”Post-Quantum Cryptography
Why Fighting Disinformation Needs Resilient Infrastructure
sphericalcowconsulting.comΒ·1hΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Red Teams Jailbreak GPT-5 with Ease, Warn It's 'Nearly Unusable' for Enterprise
securityweek.comΒ·20hΒ·
Discuss: Hacker News
πŸ€–AI
Foundry (YC F24) Is Hiring Staff Level Product Engineers
ycombinator.comΒ·1dΒ·
Discuss: Hacker News
πŸ’‘Entrepreneurship
MCA student here – confused where to start coding for IT jobs & logic building
reddit.comΒ·23hΒ·
Discuss: r/reactjs
πŸ¦€Rust Systems
The Secret History of Tor: How a Military Project Became a Lifeline for Privacy
thereader.mitpress.mit.eduΒ·1dΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Beyond good vibes: Securing AI agents by design
yanirseroussi.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Consent and Compromise
research.eye.securityΒ·22hΒ·
Discuss: Hacker News
πŸ›οΈTechnical Architecture
What even is distributed systems
notes.eatonphil.comΒ·1hΒ·
Discuss: Lobsters, Hacker News
πŸ—οΈSystem Design
Philosophy of Information
plato.stanford.eduΒ·1dΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Hackers Went Looking for a Backdoor in High-Security Safesβ€”and Now Can Open Them in Seconds
wired.comΒ·20hΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Abusing Ubuntu 24.04 features for root privilege escalation
labs.snyk.ioΒ·1dΒ·
Discuss: Lobsters, Hacker News
πŸ”Post-Quantum Cryptography
An Engineer's Perspective on Hiring
jyn.devΒ·15hΒ·
Discuss: Lobsters, Hacker News, Hacker News
πŸ•ΈοΈWASM
How America Wins the Invisible War
arenamag.comΒ·17hΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Cloud Encryption is worthless (2020)
chrisfarris.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
EyJaafCsubstantially: Cramming English words into JSON web tokens
tesseral.comΒ·2dΒ·
Discuss: Hacker News
πŸ”ŒAPI Design
Loading...Loading more...
AboutBlogChangelogRoadmap