Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎭 Steganography
Hidden Messages, Digital Watermarks, Covert Channels
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186651
posts in
24.6
ms
ReTokSync
:
Self-Synchronizing
Tokenization Disambiguation for Generative Linguistic Steganography
🔢
Homomorphic Encryption
arxiv.org
·
2d
Show HN: Vibe Check – Client-side invisible
Unicode
steganography
scanner
🔢
Homomorphic Encryption
websationflow.com
·
4d
·
Hacker News
Finder
comments,
steganography
and malware
💻
Hacking
eclecticlight.co
·
2d
King
Charles
: The hidden
messages
in his speech to Congress
🎪
Social Engineering
politico.eu
·
2d
tcsendbreak
(3) Linux
Manual
Page
🔒
Hardware Security
systutorials.com
·
9h
Best Premium Image
Websites
for
Designers
in 2026
🔢
Homomorphic Encryption
baltictimes.com
·
14h
Fraude.Codes
💻
Hacking
fraude.codes
·
2h
·
Hacker News
Non-Adaptive Programmable
PRFs
and Applications to Stacked
Garbling
🔢
Homomorphic Encryption
eprint.iacr.org
·
5d
Homepage
🔍
Reverse Engineering
essentia.upf.edu
·
20h
Asiadav/OpenPBKDF2
: An open-source ASIC implementation of the PBKDF2 algorithm using SHA256 encryption
🔢
Homomorphic Encryption
github.com
·
4h
Recovering
86-DOS from
Paper
🔍
Reverse Engineering
jscarsbrook.me
·
13h
·
Hacker News
Quantum Gatekeeper: Multi-Factor Context-Bound Image
Steganography
with
VQC
Based Key Derivation on Quantum Hardware
🔐
Cryptography
arxiv.org
·
1d
Randomness
extractor
💻
Hacking
en.wikipedia.org
·
5h
Solving
Hidden Number Problems Without
Lattices
🔢
Homomorphic Encryption
leetarxiv.substack.com
·
3d
·
Substack
,
r/programming
oss-security - Re: CVE-2026-31431:
CopyFail
: linux local privilege
scalation
💻
Hacking
openwall.com
·
11h
·
Hacker News
The Digital
Labyrinth
: How Technical
Deception
Becomes a Trap
🎪
Social Engineering
encryptedlifedecoded.medium.com
·
1d
Dango
Products
🔢
Homomorphic Encryption
dangoproducts.com
·
4h
Deepfakes are everywhere. The
godfather
of digital
forensics
is fighting back
🔬
Digital Forensics
science.org
·
10h
GDPR/CCPA
scanner, breach SIM,
remediation
🔍
Reverse Engineering
apollo.aiia-tech.com
·
1d
·
Hacker News
Behind Closed Doors -
Bypassing
RFID
Readers & Physical Access Controls
🔧
Hardware Hacking
youtube.com
·
6d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help