Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Digital Privacy
Encryption, Self-hosted Services, Data Sovereignty, P2P Networks
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
72847
posts in
286.0
ms
Digital wallets will hold '
totality
' of people's assets, says Franklin
Templeton
finance.yahoo.com
·
5d
🐅
TigerBeetle Protocol
ZeroShadow
1.0
majorgeeks.com
·
5d
📄
FlatBuffers
Subscriptions
,
Clouds
, and Streams
bluesnews.com
·
6d
⚡
NATS JetStream
Tor Project releases
Arti
2.0 with major improvements to
relay
and directory authority
alternativeto.net
·
6d
📞
Tauri IPC
The “Cloud
Reset
”: Why
Enterprises
Are Bringing Data Management Back In-House and Why Legal Should Too
cloudnine.com
·
4d
☁️
Cloud Computing
Phishing
Campaigns
Abuse Trusted Cloud Platforms, Raising New Risks for Enterprises
hackread.com
·
6d
🦠
Malware Analysis
Show HN:
Dengen
Shrine – A privacy-focused digital
Shinto
ritual
dengen-shrine.com
·
5d
·
Discuss:
Hacker News
🛡️
Privacy Engineering
Addicted
to the algorithm: how Big Tech
lobbies
to keep us hooked on social media
corporateeurope.org
·
5d
📵
Digital Minimalism
The AI
Visibility
Gap: a
Defining
Security Challenge for 2026
lmgsecurity.com
·
5d
🛡️
AI Security
Spain Social Media Ban: a
ProSurveillance
Trojan
for Censorship
fronteraelectronica.cat
·
4d
·
Discuss:
Hacker News
,
r/privacy
🛡️
Privacy Engineering
A
self-hosted
music setup that rivals
spotify
markpitblado.me
·
5d
📹
WebRTC
Accounts get
taken
over without "
hacks
", step by step
systemweakness.com
·
5d
·
Discuss:
Hacker News
🔒
Security
A Quick Look at
QUIC
potaroo.net
·
6d
·
Discuss:
Hacker News
⚡
QUIC Protocol
Liberty
as
Resistance
mattgemmell.scot
·
6d
·
Discuss:
Hacker News
📵
Digital Minimalism
Availability Attacks Without an
Adversary
: Evidence from Enterprise
LANs
arxiv.org
·
5d
🕸️
Cilium Network Policy
CySecurity
News - Latest Information Security and Hacking Incidents:
Orchid
Security Debuts Continuous Identity Observability Platform
cysecurity.news
·
5d
·
Discuss:
Blogger
🔑
Kanidm
**Abstract:** This paper proposes a novel methodology for embedding ethical
constraints
directly into autonomous weapon systems (AWS) using a
combination
of ...
freederia.com
·
4d
🛡️
AI Security
**Abstract:** The increasing reliance on Over-the-Air (OTA) software updates in autonomous vehicles (
AVs
) presents significant security vulnerabilities.
Curr
...
freederia.com
·
6d
🦅
Falco
A
Human-Centered
Privacy Approach (
HCP
) to AI
arxiv.org
·
5d
🛡️
AI Security
Concentrated
Differential
Privacy
dev.to
·
4d
·
Discuss:
DEV
🔒
Differential Privacy
Loading...
Loading more...
« Page 24
•
Page 26 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help