Feeds to Scour
SubscribedAll
Scoured 77920 posts in 1.41 s
LLM Security and Safety: Insights from Homotopy-Inspired Prompt Obfuscation
arxiv.org·3h
📏Linear Memory
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.com·20h
🛡️Taint Analysis
Preview
Report Post
Safety VS Security
dev.to·23h·
Discuss: DEV
🔐Security Types
Preview
Report Post
Design Decision for Role-Based Access Control (RBAC)
cyberark.com·18h·
Discuss: DEV
🛡️Capability Security
Preview
Report Post
Group Note Drafts: Threat Modeling Guide and Threat Model for Decentralized Credentials
w3.org·2d
🔐Capability Calculus
Preview
Report Post
Sorting secrets: how to organize encrypted data
confer.to·1d
🪢Rope Data Structures
Preview
Report Post
Call for Participation - ICANN DNSSEC and Security Workshop for the ICANN 85 Community Forum
circleid.com·14h
🔐Capability Protocols
Preview
Report Post
What Is Data Leakage
securityscorecard.com·14h
🔐Security Types
Preview
Report Post
Towards automated formal security analysis of SAML V2.0 Web Browser SSO standard -- the POST/Artifact use case
arxiv.org·1d
🔐Capability Calculus
Preview
Report Post
datahaven-xyz/datahaven: An EVM compatible Substrate chain, powered by StorageHub and secured by EigenLayer
github.com·6h
🛡️Capability VMs
Preview
Report Post
Digital hygiene
karpathy.bearblog.dev·10h
🔐Security Types
Preview
Report Post
How do we make sure AI is fair, safe, and secure?
techxplore.com·17h
🏰Capability Machines
Preview
Report Post
How to Break Any AI Model (A Machine Learning Security Crash Course)
dev.to·15h·
Discuss: DEV
🚂Error Propagation
Preview
Report Post
What Aviation Teaches Us About Auditing
docs.eventsourcingdb.io·2h·
Discuss: Hacker News
🔍Execution Tracing
Preview
Report Post
Questions regarding a private threat model...
discuss.privacyguides.net·1d
🛡️Capability Security
Preview
Report Post
Sandboxing
code.claude.com·16h·
Discuss: Hacker News
🛡️Capability VMs
Preview
Report Post
Misconfigured demo environments are turning into cloud backdoors to the enterprise
csoonline.com·9h
🛡️Capability Security
Preview
Report Post
Threat hunters can’t waste time stumbling in the dark – they need real observability
techradar.com
·1d
🔐Security Types
Preview
Report Post
Designing an Authentication System: A Dialogue in Four Scenes (1997)
web.mit.edu·1h·
Discuss: Hacker News
🛡️Capability Security
Preview
Report Post
GNU C Language Manual
gnu.org·13h
🪄C Metaprogramming
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help