Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ก๏ธ Privacy Engineering
Data Minimization, Privacy by Design, Differential Privacy, GDPR
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
145130
posts in
29.7
ms
Electronic
Privacy Information Center: Data
Minimization
epic.org
ยท
2d
๐
Differential Privacy
Why Data Engineering
Matters
in Healthcare and
Pharma
dev.to
ยท
16h
ยท
Discuss:
DEV
๐ง
Data Engineering
perghosh/Data-oriented-design
: DOD or data
oriented
design development, what is it and how to do it
github.com
ยท
21h
ยท
Discuss:
r/programming
๐ค
Language Design
In praise of private dining
rooms
and
outwitting
AI
monocle.com
ยท
50m
๐ต
Digital Minimalism
Differentially Private
Truncation
of
Unbounded
Data via Public Second Moments
arxiv.org
ยท
1d
๐
Differential Privacy
Advanced Security
Setup
discuss.privacyguides.net
ยท
1d
๐
Security
High-resolution
energy data from a sustainable industrial production area in
Karlsruhe
nature.com
ยท
4h
๐
VictoriaMetrics
Site
Reliability
Engineering - Part 5: System Design,
Incidents
, and Learning
foo.zone
ยท
1h
๐ง
DevOps
Vinext
: Vibe-Hacking Cloudflare's
Vibe-Coded
Next.js Replacement
hacktron.ai
ยท
17h
ยท
Discuss:
Hacker News
๐ฆ
Pingora
Data
Pseudonymization
: When You Can't Just
Delete
Everything
dev.to
ยท
1d
ยท
Discuss:
DEV
๐
Digital Privacy
Bridging Privacy and Utility: A
Verifiable
Framework for Data Valuation via Zero-Knowledge
Proofs
eprint.iacr.org
ยท
3d
๐
Differential Privacy
IPDR
DoT Compliance in 2026: Same
Mandate
, Different Reality
trisul.org
ยท
1d
๐
Write-Ahead Logging
OSINT
+ AI: The Ocean
Beneath
the Surface
medium.com
ยท
9h
๐ก๏ธ
AI Security
Context, not
compute
, will
define
the next generation of intelligence
techradar.com
ยท
16h
๐ฌ
Prompt Engineering
Projects
morling.dev
ยท
1d
๐ง
Abseil
Why Did My Model Do That? Model
Incrimination
for Diagnosing LLM
Misbehavior
lesswrong.com
ยท
1d
๐ฒ
Deterministic Simulation
The
Limits
of Legal Control in
Technical
Systems
leastauthority.com
ยท
2d
ยท
Discuss:
Hacker News
๐
Digital Privacy
Best
infosec-related
long
reads
for the week of 2/21/26
metacurity.com
ยท
11h
๐ฆ
Malware Analysis
Unlinkable
Inference
as a User Privacy Architecture
openanonymity.ai
ยท
1d
๐
Differential Privacy
Recovery plan and
backup
guidance for my self
hosting
services
git.luminessa.net
ยท
10h
ยท
Discuss:
r/selfhosted
๐
Self-hosting
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help