๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Security Engineering
Authentication, Authorization, Encryption, Threat Modeling
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
How the "Kim" Dump Exposed North Korea's Credential Theft Playbook
dti.domaintools.com
ยท
7h
ยท
Discuss:
Hacker News
๐
Post-Quantum Cryptography
Career Leverage as a Developer
mooreds.com
ยท
4h
ยท
Discuss:
Hacker News
๐
Post-Quantum Cryptography
Money for Nothing, Chips for Free
phrack.org
ยท
1d
ยท
Discuss:
Hacker News
๐
Post-Quantum Cryptography
Virtual panel: How software engineers and team leaders can excel with AI
infoq.com
ยท
5h
ยท
Discuss:
Hacker News
โ๏ธ
AI Infrastructure
IdentityMesh: Exploiting Lateral Movement in Agentic Systems
lasso.security
ยท
1d
ยท
Discuss:
Hacker News
๐๏ธ
Observability
How Do Committees Invent? โ Melvin E. Conway
melconway.com
ยท
20h
ยท
Discuss:
Hacker News
๐๏ธ
Technical Architecture
The 90-Day Clock: How Expiring SSL Certificates Became a Ticking Time Bomb
vanitycert.com
ยท
11h
ยท
Discuss:
Hacker News
๐๏ธ
Technical Architecture
Looking for recommendations regarding React, NextJS and TanStack courses
reddit.com
ยท
1d
ยท
Discuss:
r/reactjs
๐ป
Programming
Room: Verilog for Read-Once-Only Memory (Quantum-Inspired Security Primitive)
github.com
ยท
9h
ยท
Discuss:
Hacker News
๐
Post-Quantum Cryptography
We Hacked Burger King: How Auth Bypass Led to Drive-Thru Audio Surveillance
bobdahacker.com
ยท
13h
ยท
Discuss:
Hacker News
๐
Post-Quantum Cryptography
When Simulated Worlds Meet Real Concerns
lesswrong.com
ยท
9h
โ๏ธ
AI Infrastructure
Vibe Coding Through the Berghain Challenge
nibzard.com
ยท
12h
ยท
Discuss:
Hacker News
โ๏ธ
AI Infrastructure
MeetC2
medium.com
ยท
7h
ยท
Discuss:
Hacker News
๐
API Design
From Sound Waves to Cybersecurity: My DIY Password Generator Project
cysectools.com
ยท
1d
ยท
Discuss:
Hacker News
๐
Post-Quantum Cryptography
Strategies for securing non-human identities (services, workloads, AI agents)
cerbos.dev
ยท
1d
ยท
Discuss:
Hacker News
,
r/programming
๐๏ธ
Technical Architecture
Apple Seeks Researchers for 2026 iPhone Security Program
securityweek.com
ยท
4h
ยท
Discuss:
Hacker News
๐ค
AI
Show HN: Generate and Copy Random IP Addresses
whatismyipaddressinquire.com
ยท
1h
ยท
Discuss:
Hacker News
๐
API Design
Show HN: I built a tool that turns cryptography papers into working Python code
paperstoapp.com
ยท
2d
ยท
Discuss:
Hacker News
๐
Post-Quantum Cryptography
What does the government think an algorithm is?
tommorris.org
ยท
7h
ยท
Discuss:
Hacker News
๐ค
AI
Stop writing CLI validation. Parse it right the first time
hackers.pub
ยท
8h
ยท
Discuss:
Lobsters
,
Hacker News
,
r/programming
,
r/typescript
๐ป
Programming
Loading...
Loading more...
Page 2 »