๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›ก๏ธ Security

Encryption, Authentication, Authorization, Vulnerability, Threat, Compliance

Pre-disclosure: Upcoming coordinated security fix for all Matrix server implementations
matrix.orgยท1dยท
Discuss: Lobsters, Hacker News, Hacker News
๐Ÿฆ€Rust
How I Doubled My Lookup Performance with a Bitwise Trick
maltsev.spaceยท2d
๐Ÿฆ€Rust
The Great Sludge: Why the Internet Will Die Before You Do
dev.toยท20hยท
Discuss: DEV
๐ŸŒNetwork Security
TrialCompass: Visual Analytics for Enhancing the Eligibility Criteria Design of Clinical Trials
arxiv.orgยท18h
๐ŸŽจUX, UI
A Developer's Guide to Same-Origin Policy (SOP) and Cross-Origin Resource Sharing (CORS)
hackernoon.comยท3d
๐ŸŒNetwork Security
Roblox introduces new safeguards for teens, including age estimation tech
techcrunch.comยท11h
๐ŸŒNetwork Security
Unlock Geminiโ€™s reasoning: A step-by-step guide to logprobs on Vertex AI
developers.googleblog.comยท1d
โœ…Formal Verification
BlueGlass: A Framework for Composite AI Safety
arxiv.orgยท2d
๐Ÿฆ€Rust
We Deserve Better: A New Social Media Bill of Rights
techdirt.comยท10h
๐ŸŒNetwork Security
Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across Modalities
arxiv.orgยท1d
๐Ÿ—๏ธLanguage Design
Language Models for Adult Service Website Text Analysis
arxiv.orgยท1d
๐Ÿ—๏ธLanguage Design
Scaling Real-Time Video on AWS: How We Keep WebRTC Latency Below 150ms with Kubernetes Autoscaling
hackernoon.comยท9h
๐ŸณContainer Orchestration
SmartDocs AI - Intelligent Documentation Search with Algolia MCP Server
dev.toยท1dยท
Discuss: DEV
โœ…Formal Verification
Help me come up with an idea for my final-year computer science project
dev.toยท9hยท
Discuss: DEV
๐Ÿฆ€Rust
App Security: Common Attacks & How to Prevent Them
dev.toยท4dยท
Discuss: DEV
๐ŸŒNetwork Security
Game Theory Meets LLM and Agentic AI: Reimagining Cybersecurity for the Age of Intelligent Threats
arxiv.orgยท1d
๐ŸŒNetwork Security
Unlocking the Future of AI: A Deep Dive into the Model Context Protocol (MCP)
dev.toยท2dยท
Discuss: DEV
๐ŸณContainer Orchestration
How Software Composition Analysis (SCA) Empowers Developers to Discover Vulnerabilities Early
dev.toยท3dยท
Discuss: DEV
๐Ÿ”„DevOps
Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health
arxiv.orgยท1d
๐Ÿฆ€Rust
The Shape of Deceit: Behavioral Consistency and Fragility in Money Laundering Patterns
arxiv.orgยท1d
๐ŸŒNetwork Security
Loading...Loading more...
AboutBlogChangelogRoadmap