πΏοΈ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Security Engineering
Authentication, Authorization, Encryption, Threat Modeling
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Stop writing CLI validation. Parse it right the first time
hackers.pub
Β·
1d
Β·
Discuss:
Lobsters
,
Hacker News
,
r/programming
,
r/typescript
π»
Programming
Show HN: Storing private blogs on public internet with 0 verifications
sgaud.com
Β·
2d
Β·
Discuss:
Hacker News
π
Post-Quantum Cryptography
Civics Is Boring. So, Let's Encrypt Something
queue.acm.org
Β·
5d
Β·
Discuss:
Hacker News
π
Post-Quantum Cryptography
Re Falcon 030: designing replica PCB of Atari Falcon
re-falcon.com
Β·
22h
Β·
Discuss:
Hacker News
πΈοΈ
WASM
Bad actors exploit X's Grok to run 'racy' malvertising campaign
scworld.com
Β·
2d
Β·
Discuss:
Hacker News
π€
AI
Gym Class VR (YC W22) Is Hiring β UX Design Engineer
ycombinator.com
Β·
2d
Β·
Discuss:
Hacker News
π‘
Entrepreneurship
Unleashing the Hound: How AI Agents Find Deep Logic Bugs in Any Codebase
muellerberndt.medium.com
Β·
2d
Β·
Discuss:
Hacker News
π¦
Rust Systems
I made a crackme that unlocks a free copy of my book
blog.ryanmerket.com
Β·
1d
Β·
Discuss:
Hacker News
π¦
Rust Systems
LLMs Are Adaptive Data Organisms
worldgov.org
Β·
1d
Β·
Discuss:
Hacker News
π
Data Engineering
A Secret Web
blog.clew.se
Β·
1d
Β·
Discuss:
Lobsters
,
Hacker News
π€
AI
(Republished from 2021): Your legacy database is outgrowing itself
unstructedtech.com
Β·
14h
Β·
Discuss:
Hacker News
ποΈ
Database Optimization
How did MVC get so F'ed up?
stlab.cc
Β·
1d
Β·
Discuss:
Hacker News
πΈοΈ
WASM
On Becoming an Engineer at Dropbox
nikrad.io
Β·
4d
Β·
Discuss:
Hacker News
ποΈ
System Design
Ask HN: How can non-technical Internet users protect themselves?
news.ycombinator.com
Β·
30m
Β·
Discuss:
Hacker News
π€
AI
Using Claude Code to modernize a forgotten Linux kernel driver
dmitrybrant.com
Β·
1h
Β·
Discuss:
Lobsters
,
Hacker News
π¦
Rust Systems
Why β Decompression Through Inquiry
williamolivers.substack.com
Β·
7h
Β·
Discuss:
Substack
π
Post-Quantum Cryptography
The Three Laws of Humanics
pinchito.es
Β·
1h
Β·
Discuss:
Hacker News
π€
AI
Industry Groups Call on Congress to Renew Cybersecurity Law Before Expiration
bpi.com
Β·
22h
Β·
Discuss:
Hacker News
π
Post-Quantum Cryptography
Vibe Coding Fiasco: AI Agent Goes Rogue, Deletes Company's Database
pcmag.com
Β·
1h
Β·
Discuss:
Hacker News
π€
AI
Canaries in the Coal Mine? Six Facts about the Recent Employment Effects of AI
arxiviq.substack.com
Β·
13h
Β·
Discuss:
Substack
βοΈ
AI Infrastructure
Loading...
Loading more...
« Page 3
β’
Page 5 »