πΏοΈ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Security Engineering
Authentication, Authorization, Encryption, Threat Modeling
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Formally verifying a floating-point division routine with Gappa β part 1
community.arm.com
Β·
5h
Β·
Discuss:
Lobsters
,
Hacker News
,
r/programming
π
Post-Quantum Cryptography
iText 9.4.0 Brings LOTL Functionality for Seamless EU PDF Signature Validation
kb.itextpdf.com
Β·
4h
Β·
Discuss:
Hacker News
πΈοΈ
WASM
Chinese hackers breach 700 companies through single Salesforce integration
nearlyright.com
Β·
1d
Β·
Discuss:
Hacker News
ποΈ
Observability
Building Supabase-Like OAuth Authentication for MCP Servers
hyprmcp.com
Β·
4h
Β·
Discuss:
Hacker News
π
API Design
Dynamo AI (YC W22) Is Hiring for AI Product Managers
ycombinator.com
Β·
1d
Β·
Discuss:
Hacker News
π‘
Entrepreneurship
Computer Security: Block ads, stay clean
home.cern
Β·
2h
Β·
Discuss:
Hacker News
π
Post-Quantum Cryptography
AI Agent Security β Why You Should Pay Attention
medium.com
Β·
2d
Β·
Discuss:
Hacker News
ποΈ
Observability
Show HN: A unified approach to compute sandboxes
computesdk.com
Β·
21h
Β·
Discuss:
Hacker News
ποΈ
Technical Architecture
Anti-patterns and patterns for achieving secure generation of code via AI
ghuntley.com
Β·
2d
Β·
Discuss:
Hacker News
π
Post-Quantum Cryptography
Internet mapping and research outfit Censys reveals state-based abuse, harassment
theregister.com
Β·
1d
Β·
Discuss:
Hacker News
π€
AI
Our Approach to Building Career Agency
people-work.io
Β·
3h
Β·
Discuss:
Hacker News
π‘
Entrepreneurship
RapperBot: From Infection to DDoS in a Split Second
bitsight.com
Β·
1d
Β·
Discuss:
Hacker News
ποΈ
Observability
We detected a CAPTCHA solver in the wild, and what it says about bot defenses
blog.castle.io
Β·
22h
Β·
Discuss:
Hacker News
π€
AI
Introduction to Ada: a project-based exploration with rosettas
blog.adacore.com
Β·
1d
Β·
Discuss:
Lobsters
,
Hacker News
,
r/programming
π¦
Rust Systems
ML Systems: Motivating Dense Models
jacobkahn.me
Β·
19h
Β·
Discuss:
Hacker News
π
Post-Quantum Cryptography
FusionAuth, AI, and the Chapters That Shape Us
lucas.untethered4life.com
Β·
1d
Β·
Discuss:
Hacker News
π‘
Entrepreneurship
Primary Keys in Sharded Databases
pgdog.dev
Β·
1h
Β·
Discuss:
Hacker News
ποΈ
Database Optimization
1965 Cryptanalysis Training Workbook Released by the NSA
schneier.com
Β·
2d
Β·
Discuss:
Hacker News
π
Post-Quantum Cryptography
Unifying real-time analytics and observability with OpenTelemetry and ClickStack
clickhouse.com
Β·
2h
Β·
Discuss:
Hacker News
ποΈ
Observability
Creating a Knowledge Graph for ICD Codes Using LLMs
ai.gopubby.com
Β·
8h
Β·
Discuss:
Hacker News
π
API Design
Loading...
Loading more...
« Page 1
β’
Page 3 »