Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Digital Privacy
Encryption, Self-hosted Services, Data Sovereignty, P2P Networks
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
171018
posts in
14.7
ms
Privacy vs.
Visibility
: Can We Have Both in a
Censored
Internet?
🛡️
Packet Filtering
medium.com
·
6h
Anamorphic
Encryption with
CCA
Security: A Standard Model Construction
🔢
Homomorphic Encryption
arxiv.org
·
4d
Citizen Lab:
Webloc
tracked
500M
devices for global law enforcement
🔭
Tracing
securityaffairs.com
·
1d
#
PrivacyCamp25
: Event
summary
🛡️
Privacy Engineering
europedigital.cloud
·
11h
Lightweight multi-client
order-revealing
encryption with limited
leakage
⚖️
Consistent Hashing
sciencedirect.com
·
1d
Understanding Dark Web Privacy Tools and Their Role Online
🔒
Differential Privacy
medium.com
·
4d
Show HN: Zero-identity
messaging
app with physics-based post-quantum
encryption
🔢
Homomorphic Encryption
news.ycombinator.com
·
1d
·
Hacker News
Surfshark
Just Dropped a Next-Gen VPN Protocol That Could Be Faster and More Secure Than Other VPN
Connections
🔐
WireGuard
cnet.com
·
1d
Breaking the
stranglehold
: Responses to data
sovereignty
risk
🔐
Capability Systems
computerweekly.com
·
4d
Cloud platform for
managing
your privacy
policies
🏠
Self-Hosting
plus.openpolicy.sh
·
2d
·
Hacker News
adityarai0133-rajput/Aadi-tech-vault
-: A lightweight encryption system based on aes 256 by Aditya Rai aadi-tech from
laksar
🛡️
AMD SEV
github.com
·
5d
·
DEV
Yikes
, Encryption’s
Y2K
Moment is Coming Years Early
🔐
Cryptography
eff.org
·
4d
·
Hacker News
The Privacy Black
Hole
: Third-Party
Doctrine
📵
Digital Minimalism
incognitocat.me
·
6d
·
Hacker News
GDPR
Compliance and Data
Deletion
in Software Systems
🛡️
Privacy Engineering
dzone.com
·
5d
The Architecture of a Modern Health App:
Balancing
UX
with Extreme Data Privacy
🛡️
Privacy Engineering
medium.com
·
6d
Public Key vs Private Key:
Differences
,
Uses
, and How They Work
🔐
Cryptography
medium.com
·
3d
The Myth of Digital
Anonymity
(Case Study): India’s Most Sophisticated
Darknet
Drug Kingpin Still…
🔢
Homomorphic Encryption
medium.com
·
5d
The
Manifest
– Browser-only encrypted
P2P
file sharing & chat (no servers, no trace)
🧩
Browser Extensions
discuss.privacyguides.net
·
5d
ParrotOS
+
Usenet
: A Complete VPS & Home Server Setup Guide
🔍
eBPF
linuxserverguides.com
·
4d
·
Hacker News
,
r/homelab
,
r/selfhosted
BRASP
:
Boolean
Range Queries over Encrypted Spatial Data with Access and Search Pattern Privacy
🔢
Homomorphic Encryption
arxiv.org
·
4d
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help