Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
👁️ Biometrics
Fingerprints, Facial Recognition, Authentication, Spoofing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186556
posts in
12.2
ms
Scalable Secure Biometric Authentication without
Auxiliary
Identifiers
🔢
Homomorphic Encryption
arxiv.org
·
2d
How
Authentication
Actually Works
🔐
Cryptography
coderoasis.com
·
5d
ID
Tech
Digest
🔧
Hardware Hacking
einnews.com
·
7h
Christophe
Pettus
: All Your
GUCs
in a Row: authentication_timeout
💻
Hacking
thebuild.com
·
4h
Facial
recognition data is a key to your identity – if stolen, you can’t just change the
locks
🕶️
Privacy Tech
theconversation.com
·
2d
ABB
Ability
OPTIMAX
🛡️
Network Security
cisa.gov
·
13h
Understanding
Facial
Recognition Systems in Modern Security
Environments
🕶️
Privacy Tech
medium.com
·
3d
What are the most common
authentication
methods
?
🕶️
Privacy Tech
techtarget.com
·
1d
Researchers discover new all-in-one ‘
Bluekit
’ phishing kit capable of bypassing enterprise 2FA protocols and
emulating
40+ global brands
🎪
Social Engineering
techradar.com
·
13h
Gitea
Customization |
fernvenue
's Blog
💻
Hacking
blog.fernvenue.com
·
5h
How to Find
Compromised
&
Reused
Passwords on iPhone, iPad, and Mac
🔍
Reverse Engineering
osxdaily.com
·
14h
Odd
factor
authentication
💻
Hacking
thefoggiest.dev
·
1d
The
Authentication
Layer
🎪
Social Engineering
stylman.substack.com
·
6d
·
Substack
noyb sues Hamburg DPA as
PimEyes
keeps scanning faces
unhindered
🔢
Homomorphic Encryption
ppc.land
·
21h
·
r/europe
Writing
style as your digital
fingerprint
🎭
Steganography
flowingdata.com
·
1d
OpenAI partners with
Yubico
: What it means for the future of AI-based
workflows
and the role of the human
🔒
Hardware Security
yubico.com
·
12h
The Making of Digital
Identity
- 06 - The Mobile Revolution and the
Surveillance
Machine
🎪
Social Engineering
syntheticauth.ai
·
2d
·
Hacker News
,
r/programming
Ordinary
Chinese Citizens Now Caught in Facial Recognition
Dragnet
🔬
Digital Forensics
chinascope.org
·
4d
EtherRAT
Distribution Spoofing Administrative Tools via GitHub
Facades
🔍
Reverse Engineering
thehackernews.com
·
17h
Stopping
AiTM
attacks: The defenses that actually work after authentication
succeeds
🎪
Social Engineering
csoonline.com
·
2d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help