🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ Security Engineering

Authentication, Authorization, Encryption, Threat Modeling

Formally verifying a floating-point division routine with Gappa – part 1
community.arm.comΒ·5hΒ·
Discuss: Lobsters, Hacker News, r/programming
πŸ”Post-Quantum Cryptography
iText 9.4.0 Brings LOTL Functionality for Seamless EU PDF Signature Validation
kb.itextpdf.comΒ·4hΒ·
Discuss: Hacker News
πŸ•ΈοΈWASM
Chinese hackers breach 700 companies through single Salesforce integration
nearlyright.comΒ·1dΒ·
Discuss: Hacker News
πŸ‘οΈObservability
Building Supabase-Like OAuth Authentication for MCP Servers
hyprmcp.comΒ·4hΒ·
Discuss: Hacker News
πŸ”ŒAPI Design
Dynamo AI (YC W22) Is Hiring for AI Product Managers
ycombinator.comΒ·1dΒ·
Discuss: Hacker News
πŸ’‘Entrepreneurship
Computer Security: Block ads, stay clean
home.cernΒ·2hΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
AI Agent Security – Why You Should Pay Attention
medium.comΒ·2dΒ·
Discuss: Hacker News
πŸ‘οΈObservability
Show HN: A unified approach to compute sandboxes
computesdk.comΒ·21hΒ·
Discuss: Hacker News
πŸ›οΈTechnical Architecture
Anti-patterns and patterns for achieving secure generation of code via AI
ghuntley.comΒ·2dΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Internet mapping and research outfit Censys reveals state-based abuse, harassment
theregister.comΒ·1dΒ·
Discuss: Hacker News
πŸ€–AI
Our Approach to Building Career Agency
people-work.ioΒ·3hΒ·
Discuss: Hacker News
πŸ’‘Entrepreneurship
RapperBot: From Infection to DDoS in a Split Second
bitsight.comΒ·1dΒ·
Discuss: Hacker News
πŸ‘οΈObservability
We detected a CAPTCHA solver in the wild, and what it says about bot defenses
blog.castle.ioΒ·22hΒ·
Discuss: Hacker News
πŸ€–AI
Introduction to Ada: a project-based exploration with rosettas
blog.adacore.comΒ·1dΒ·
Discuss: Lobsters, Hacker News, r/programming
πŸ¦€Rust Systems
ML Systems: Motivating Dense Models
jacobkahn.meΒ·19hΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
FusionAuth, AI, and the Chapters That Shape Us
lucas.untethered4life.comΒ·1dΒ·
Discuss: Hacker News
πŸ’‘Entrepreneurship
Primary Keys in Sharded Databases
pgdog.devΒ·1hΒ·
Discuss: Hacker News
πŸ—ƒοΈDatabase Optimization
1965 Cryptanalysis Training Workbook Released by the NSA
schneier.comΒ·2dΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Unifying real-time analytics and observability with OpenTelemetry and ClickStack
clickhouse.comΒ·2hΒ·
Discuss: Hacker News
πŸ‘οΈObservability
Creating a Knowledge Graph for ICD Codes Using LLMs
ai.gopubby.comΒ·8hΒ·
Discuss: Hacker News
πŸ”ŒAPI Design
Loading...Loading more...
AboutBlogChangelogRoadmap