Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ก๏ธ Privacy Engineering
Data Minimization, Privacy by Design, Differential Privacy, GDPR
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
109446
posts in
1.29
s
Group Note Draft:
Considerations
for
Reviewing
Differential Privacy Systems (for Non-Differential Privacy Experts)
w3.org
ยท
3h
๐
Differential Privacy
D is for Data Engineering
dev.to
ยท
1d
ยท
Discuss:
DEV
๐ฏ
Content Discovery
Digital Omnibus: EDPB and
EDPS
support
simplification
and competitiveness while raising key concerns
edpb.europa.eu
ยท
1d
๐
GDPR
Anonymization-Enhanced
Privacy Protection for Mobile
GUI
Agents: Available but Invisible
arxiv.org
ยท
9h
๐
Differential Privacy
Outcome
Engineering
o16g.com
ยท
19h
ยท
Discuss:
Hacker News
๐
Web Performance
HoWDe
: A
validated
algorithm for Home and Work location Detection
sciencedirect.com
ยท
4h
๐ฏ
Content Discovery
RFC 4262: X.509 Certificate Extension for
Secure/Multipurpose
Internet Mail Extensions (
S/MIME
) Capabilities
rfc-editor.org
ยท
19h
๐
Web Standards
Increasingly,
HIPAA
Canโt Stop AI from
De-Anonymizing
Patient Data
unite.ai
ยท
22h
ยท
Discuss:
Hacker News
๐
Privacy Compliance
Computer
Forensic
Tools Comparison
Chart
2026
cybertriage.com
ยท
7h
๐ป
technology
Self-cleaning
hierarchical thermal
cloak
nature.com
ยท
4h
๐ป
technology
KeyleSSH
: A New PAM Concept for IT
Admins
dev.to
ยท
12h
ยท
Discuss:
DEV
๐ฆ
Bluesky
FinovateEurope
2026: From AI
Hype
To BankโReady Execution
forrester.com
ยท
3h
โก
Hardware Acceleration
Measuring
Privacy Risks and
Tradeoffs
in Financial Synthetic Data Generation
arxiv.org
ยท
1d
๐
Differential Privacy
How a Single Image
Uncovered
an
Entire
Digital Identity
medium.com
ยท
5h
๐ฆ
Bluesky
Comparing
1c9ec69115
..
.16d56967b7
github.com
ยท
45m
๐ฆ
Personal Archiving
Why
Multidisciplinary
Skills Are the Secret
Weapon
in Information Management
info.aiim.org
ยท
2h
๐
Bookmarking Systems
What Agentic AI "Vibe Coding" In The Hands Of
Actual
Programmers
/ Engineers
stochasticlifestyle.com
ยท
1h
๐ป
technology
Decoupling
Monolithic
APIs for Mobile Teams in 2026
indiit.com
ยท
3h
ยท
Discuss:
DEV
๐ฑ
Progressive Web Apps
GTIG
AI Threat Tracker: Distillation,
Experimentation
, and (Continued) Integration of AI for Adversarial Use
cloud.google.com
ยท
7h
๐
Content Curation
Graph network-based design optimization of multiple
chiller
systems with knowledge from
existing
systems
sciencedirect.com
ยท
1d
๐ฏ
Recommendation Systems
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help