Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Digital Privacy
Encryption, Self-hosted Services, Data Sovereignty, P2P Networks
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
73304
posts in
583.6
ms
India’s
DPI
2.0: From UPI to Universal Data
Empowerment
orfonline.org
·
5d
📡
P4
DeepSeek and the China data question: Direct collection, open source, and the limits of
extraterritorial
enforcement
iapp.org
·
5d
📡
SonarQube
Digital
Sacrum
: When
Algorithms
Begin to Believe 🤖✨
vocal.media
·
4d
🤖
Cyberpunk
Anyone have experience with the
Supabase
light REST api
wrapper
?
supabase.com
·
5d
·
Discuss:
r/webdev
⚡
Supabase
Zuck
,
ConnectU
, and intellectual property in the age of vibecoding
pechotierra.bearblog.dev
·
4d
📦
Folly
RFC 9518 -
Centralization
,
Decentralization
, and Internet Standards
datatracker.ietf.org
·
6d
🔄
Distributed Systems
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
4d
·
Discuss:
Hacker News
🔗
Intrusive Containers
Bye
Bye
Big Tech:
Extra
tips
bitsoffreedom.nl
·
4d
📵
Digital Minimalism
Crypto-asset
Taxonomy
for Investors and
Regulators
arxiv.org
·
4d
⛓️
Blockchain
Malicious
use of virtual machine infrastructure
sophos.com
·
6d
🛡️
AMD SEV
pocket-id/pocket-id: A simple and easy-to-use
OIDC
provider that allows users to
authenticate
with their passkeys to your services.
github.com
·
4d
🔑
Kanidm
Dutch authorities
seized
one of
Windscribe
VPN's servers
techradar.com
·
4d
🔐
WireGuard
SixPath
: Network
visualization
and management app
github.com
·
4d
·
Discuss:
r/selfhosted
🐝
Cilium
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
4d
·
Discuss:
Hacker News
#️⃣
Hash Tables
CySecurity
News - Latest Information Security and Hacking Incidents: Why Cloud
Outages
Turn Identity Systems into a Critical Business Risk
cysecurity.news
·
6d
·
Discuss:
Blogger
☁️
Cloud Computing
**Abstract:** This paper introduces an automated regulatory compliance framework designed to streamline the approval process for wearable
physiological
monit
...
freederia.com
·
4d
💓
PHI Accrual
Concentrated
Differential
Privacy
dev.to
·
4d
·
Discuss:
DEV
🔒
Differential Privacy
Quantum encryption method
demonstrated
at city-sized
distances
for the first time
phys.org
·
3d
⚛️
Quantum Computing
I Built a Tiny Domain
Inventory
Tool (Because I Used to Buy Too Many
Domains
)
dev.to
·
2d
·
Discuss:
DEV
🧲
Maglev
15 Top Open-Source Intelligence Tools
medium.com
·
2d
🌐
Network Security
Loading...
Loading more...
« Page 21
•
Page 23 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help