Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Digital Privacy
Encryption, Self-hosted Services, Data Sovereignty, P2P Networks
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
73039
posts in
1.21
s
DeepSeek and the China data question: Direct collection, open source, and the limits of
extraterritorial
enforcement
iapp.org
ยท
5d
๐ก
SonarQube
Digital
Sacrum
: When
Algorithms
Begin to Believe ๐คโจ
vocal.media
ยท
4d
๐ค
Cyberpunk
Anyone have experience with the
Supabase
light REST api
wrapper
?
supabase.com
ยท
4d
ยท
Discuss:
r/webdev
โก
Supabase
Zuck
,
ConnectU
, and intellectual property in the age of vibecoding
pechotierra.bearblog.dev
ยท
4d
๐ฆ
Folly
Unhackable
metasurface
holograms
: Security technology can lock information with light color and distance
techxplore.com
ยท
6d
๐ข
Homomorphic Encryption
RFC 9518 -
Centralization
,
Decentralization
, and Internet Standards
datatracker.ietf.org
ยท
6d
๐
Distributed Systems
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
ยท
4d
ยท
Discuss:
Hacker News
๐
Intrusive Containers
Bye
Bye
Big Tech:
Extra
tips
bitsoffreedom.nl
ยท
4d
๐ต
Digital Minimalism
Crypto-asset
Taxonomy
for Investors and
Regulators
arxiv.org
ยท
4d
โ๏ธ
Blockchain
How
Homepage
simplifies
monitoring your self-hosted services
thenewstack.io
ยท
3d
๐
Self-hosting
Malicious
use of virtual machine infrastructure
sophos.com
ยท
6d
๐ก๏ธ
AMD SEV
The
Logic
of
Surveillance
(2013)
ianwelsh.net
ยท
4d
ยท
Discuss:
Hacker News
๐ญ
Tracing
Dutch authorities
seized
one of
Windscribe
VPN's servers
techradar.com
ยท
3d
๐
WireGuard
pocket-id/pocket-id: A simple and easy-to-use
OIDC
provider that allows users to
authenticate
with their passkeys to your services.
github.com
ยท
4d
๐
Kanidm
Emergence-as-Code
for
Self-Governing
Reliable Systems
arxiv.org
ยท
4d
๐ฒ
Cellular Automata
CySecurity
News - Latest Information Security and Hacking Incidents: Why Cloud
Outages
Turn Identity Systems into a Critical Business Risk
cysecurity.news
ยท
5d
ยท
Discuss:
Blogger
โ๏ธ
Cloud Computing
**Abstract:** This paper introduces an automated regulatory compliance framework designed to streamline the approval process for wearable
physiological
monit
...
freederia.com
ยท
4d
๐
PHI Accrual
**Abstract:** Decentralized Autonomous Organizations (
DAOs
) face significant legal uncertainties regarding their operational
legality
and potential liability...
freederia.com
ยท
4d
๐ฐ
TigerBeetle
7 apps I use to
lock
down,
encrypt
, and store my private files - and most are free
zdnet.com
ยท
4d
๐
File Systems
Concentrated
Differential
Privacy
paperium.net
ยท
4d
ยท
Discuss:
DEV
๐
Differential Privacy
Loading...
Loading more...
« Page 19
โข
Page 21 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help