Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Digital Privacy
Encryption, Self-hosted Services, Data Sovereignty, P2P Networks
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
72842
posts in
1.23
s
India’s
DPI
2.0: From UPI to Universal Data
Empowerment
orfonline.org
·
4d
📡
P4
US Gov
Directive
Cracks Down on
Unsupported
Edge Devices
decipher.sc
·
4d
🛡️
Packet Filtering
Best Data Loss
Prevention
Software of 2026
theaisurf.com
·
5d
🔐
Capability Systems
The Infrastructure Problem: When
Blackmail
Systems
Outlive
Their Operators
cafebedouin.org
·
4d
🔭
Tracing
Telling the Story of
Chameleon
Hash
Functions: A 27-Year Review
eprint.iacr.org
·
5d
🐦
Cuckoo Hashing
I built a persistent layer over the real world. 691 million tiles. No bots, no crypto, no
landlords
. Just a blank slate for us to paint on. Let's see what
happe
...
tileterra.com
·
4d
·
Discuss:
r/InternetIsBeautiful
🏗️
Terraform
The ‘Super Bowl’ standard:
Architecting
distributed systems for massive
concurrency
infoworld.com
·
4d
📡
Event-Driven Architecture
What Is Thread?
Matter
’s Smart Home Network
Protocol
, Explained
wired.com
·
4d
🏠
Home Automation
Staying
secure and simple in a
complex
world
tailscale.com
·
6d
🔒
Security
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
·
4d
·
Discuss:
Substack
🛡️
AI Security
The
OSINT
Newsletter
- Issue #93
osintnewsletter.com
·
4d
🦠
Malware Analysis
Show HN: A PRIVACY first
intimate
tracker
apps.apple.com
·
4d
·
Discuss:
Hacker News
📊
HyperLogLog
OSINT
Case Study: Leveraging
SOCMINT
and Breach Data for Counter-Terrorism
infosecdad.medium.com
·
4d
🛡️
Cybersecurity
Trust & Safety, built for what’s next:
Musubi
x
Tremau
musubilabs.ai
·
5d
·
Discuss:
Hacker News
🛡️
AI Security
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
4d
·
Discuss:
Hacker News
#️⃣
Hash Tables
SixPath
: Network
visualization
and management app
github.com
·
4d
·
Discuss:
r/selfhosted
🐝
Cilium
Origin Lens: A Privacy-First Mobile Framework for
Cryptographic
Image
Provenance
and AI Detection
arxiv.org
·
6d
🔢
Homomorphic Encryption
Petanux
edge-AI self-checkout with
faytech
barcode-free product detection, in-camera inference, GDPR
armdevices.net
·
3d
🔐
Hardware Security
How your smart tech could make you a target for
burglars
iotinsider.com
·
6d
🔐
Hardware Security
Preservica
transforms
Digital Preservation with integrated human-centric AI
preservica.com
·
6d
💾
Digital Archiving
Loading...
Loading more...
« Page 19
•
Page 21 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help