🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🧮 Homomorphic Encryption

Secure Computation, Privacy-Preserving Analytics, Encrypted Data Processing

A method for preventing browser extension fingerprinting
chuniversiteit.nl·18h
🔗Crypto
A cellular entity retaining only its replicative core
biorxiv.org·16h·
Discuss: Hacker News
🔄Protocol Design
Whack-a-mole warfare: Europe’s battle against AI-fueled Kremlin lies
euractiv.com·4h·
Discuss: r/worldnews
🔄Protocol Design
Computer Scientists Figure Out How To Prove Lies
quantamagazine.org·4d·
Discuss: Lobsters, Hacker News, Hacker News, Hacker News
🔐Zero-Knowledge Proofs
Sequencing 101: Software and bioinformatics powering long-read sequencing
pacb.com·3d
🔧MLIR
[memo]RDT-1B: a Diffusion Foundation Model for Bimanual Manipulation
dev.to·53m·
Discuss: DEV
🛡️AI Safety
🧠 Understanding the AUC-ROC Curve in Machine Learning (with Python code!)
dev.to·17h·
Discuss: DEV
🛡️AI Safety
Crypto Workers Tricked in Job Scams Involving New Malware Linked to North Korea
blogger.com·2d
🔗Crypto
What makes a legal statement executable? Towards a formal grammar of computable norms.
dev.to·10h·
Discuss: DEV
⚙️Programming
Event-Carried State Transfer for Tax Calculation in Fintech Real-Time Architecture with Kafka, Go, and PostgreSQL
dev.to·12h·
Discuss: DEV
📜Smart Contracts
The Perils of Optimizing Learned Reward Functions
lesswrong.com·2d
🛡️AI Safety
I built a vector-value database in pure C: libvictor + victordb (daemon) — AMA / Feedback welcome
github.com·2d·
Discuss: r/programming
⚙️Programming
Intelligent Control of Spacecraft Reaction Wheel Attitude Using Deep Reinforcement Learning
arxiv.org·4h
🛡️AI Safety
Middleware Architecture Patterns for Request Processing(5636)
dev.to·1d·
Discuss: DEV
📜Smart Contracts
Full-Stack DIY Smart Home: ESP8266/STM32, MQTT & WebSockets
hackster.io·1d
🔄Protocol Design
Interface Inheritance, Types and Enums with TypeScript - Practical Example
dev.to·3h·
Discuss: DEV
⚙️Programming
sca-fuzzer: Revizor - a fuzzer to search for microarchitectural leaks in CPUs
github.com·1d·
Discuss: Lobsters, Hacker News
🔧MLIR
Rethinking the Privacy of Text Embeddings: A Reproducibility Study of "Text Embeddings Reveal (Almost) As Much As Text"
arxiv.org·3d
🔐Zero-Knowledge Proofs
Modeling Partially Observed Nonlinear Dynamical Systems and Efficient Data Assimilation via Discrete-Time Conditional Gaussian Koopman Network
arxiv.org·4h
🌐Decentralized AI
🔌 Building Resilient Database Operations with Aiobreaker + Async SQLAlchemy + FastAPI
dev.to·4h·
Discuss: DEV
✅Formal Verification
Loading...Loading more...
AboutBlogChangelogRoadmap