Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🧹 Spam Filters
Algorithms for filtering spam
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
152470
posts in
80.5
ms
Ask HN: LLM-Based
Spam
Filter
💉
Prompt Injection
news.ycombinator.com
·
5d
·
Hacker News
What Google actually looks for when it
catches
spam
sites
💳
Content Monetization
ppc.land
·
5h
Intelligent
Data
Summarization
in Cybersecurity
🔒
Privacy-Preserving Analytics
medium.com
·
1d
A-RAG: The 3-Tool Retrieval Architecture That Makes
Naive
RAG
Obsolete
🔄
LLM RAG Pipelines
medium.com
·
17h
The long road to your crypto:
ClipBanker
and its marathon
infection
chain
🚩
CTF Writeups
securelist.com
·
1d
Ensembles
at Any Cost? Accuracy-Energy Trade-offs in
Recommender
Systems
📊
Statistical Ranking
arxiv.org
·
20h
Article: Bloom
Filters
: Theory, Engineering Trade‑
offs
, and Implementation in Go
🌸
Bloom Filters
infoq.com
·
3d
Building a Real Recommendation System
Pipeline
(End-to-End, No
Shortcuts
)
🏆
Ranking
medium.com
·
1d
Observations
on blocking various
webbots
🕷️
Web Crawling
boston.conman.org
·
2d
sadhgurutech/mailtrim
: Find and clean hidden Gmail clutter in seconds. Runs locally. Free forever.
🚩
CTF Writeups
github.com
·
5d
Battling bots •
Cory
Dransfeldt
🚩
CTF Writeups
coryd.dev
·
4d
·
Hacker News
Sound as an Attack
Vector
: Introducing
phonemenal
🔤
Tokenization
br0k3nlab.com
·
4d
Improving Search Suggestions for
Alphanumeric
Queries
🔍
Information Retrieval
arxiv.org
·
20h
Phishing
Analysis
Fundamentals
🦠
Malware Analysis
medium.com
·
4d
Know
exactly
who you’re
dealing
with
🤖
Web Crawling Politeness
tryaipi.com
·
6d
·
r/SideProject
Scaling Fuzzy Deduplication:
MinHash
,
LSH
, and Union-Find
🧮
LSH
medium.com
·
3d
Can Drift-Adaptive Malware
Detectors
Be Made Robust? Attacks and
Defenses
Under White-Box and Black-Box Threats
🛡️
AI Security
arxiv.org
·
1d
The Random
Subsequence
Model and Uniform Codes for the
Deletion
Channel
🎯
Vector Quantization
arxiv.org
·
1d
Comprehensive List of User
Deception
Techniques
in Emails
🚩
CTF Writeups
arxiv.org
·
3d
Query
Optimization and Evaluation via Information Theory: A
Tutorial
🔍
Query Optimization
arxiv.org
·
3d
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help