Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
76376
posts in
257.2
ms
Examining
black-box forensic tools in digital vehicle
forensics
: Capabilities, limitations, and practical implications
sciencedirect.com
·
4d
🔍
Digital Forensics
Linear
Regression
: An
Overview
dev.to
·
1d
·
Discuss:
DEV
📊
Optimization
Spanish
Red Cross launches privacy-first
blockchain
aid platform
cointelegraph.com
·
4d
⛓️
Blockchain
What are some interesting or
exciting
technologies that you have heard about
recently
which you think may be important for online privacy/security in the future...
discuss.privacyguides.net
·
5d
🔒
Digital Privacy
Building a Privacy-First
URL
Shortener
on Blockchain
dev.to
·
1d
·
Discuss:
DEV
🔒
Digital Privacy
I made my own encrypted
tunnels
with
NodePass
because I don't trust Cloudflare
xda-developers.com
·
4d
🦀
Pingora
On
QC
and
GQC
algebraic geometry codes
arxiv.org
·
1d
3️⃣
Three-Address Code
Five
Predictions
for
Cyber
Security Trends in 2026
heimdalsecurity.com
·
3d
🔒
Security
Staying
secure and simple in a
complex
world
tailscale.com
·
4d
🔒
Security
**Abstract:** The increasing
proliferation
of genetic data presents unprecedented opportunities for medical advancements, yet
simultaneously
raises critical ...
freederia.com
·
1d
🔢
Homomorphic Encryption
RP2350
Hacking Challenge 2: Less
randomisation
, more correlation
raspberrypi.com
·
4d
·
Discuss:
Hacker News
🔐
Hardware Security
Digital ID done right:
verifiable
claims without the
surveillance
willhackett.uk
·
4d
·
Discuss:
Hacker News
🔑
Kanidm
Efficient Bayesian
Sieve
Modeling for Predicting Twin Prime Density in Large Numerical Ranges **Abstract** The distribution of twin
primes
—pairs of
primes
se...
freederia.com
·
1d
📊
HyperLogLog
FHAIM
: Fully
Homomorphic
AIM For Private Synthetic Data Generation
arxiv.org
·
1d
🔐
Homomorphic Secret Sharing
How
Computers
Work: Explained from First
Principles
sushantdhiman.substack.com
·
5d
·
Discuss:
r/coding
,
r/compsci
,
r/programming
🧠
Memory Models
Cryptanalytic
Extraction of Neural Networks with Various
Activation
Functions
eprint.iacr.org
·
4d
🛡️
AI Security
Gone Phishing, Got a Token: When Separate
Flaws
Combine
praetorian.com
·
3d
·
Discuss:
DEV
🔒
Security
A Quick Look at
QUIC
potaroo.net
·
4d
·
Discuss:
Hacker News
⚡
QUIC Protocol
Microsoft is Giving the FBI
BitLocker
Keys
schneier.com
·
4d
·
Discuss:
schneier.com
🔐
Hardware Security
Example of Windows
Warbird
Encryption/Decryption
downwithup.github.io
·
4d
·
Discuss:
Hacker News
🔓
Binary Exploitation
Loading...
Loading more...
« Page 6
•
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help