Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Privacy Engineering
Data Minimization, Privacy by Design, Differential Privacy, GDPR
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74090
posts in
947.2
ms
Design
sketches
for a more
sensible
world
lesswrong.com
·
1d
🗃️
Zettelkasten
Concept-Aware Privacy
Mechanisms
for
Defending
Embedding Inversion Attacks
arxiv.org
·
17h
🔒
Differential Privacy
E2EE
Backend part 1:
Homomorphic
Encryption
peterspath.net
·
1d
·
Discuss:
Hacker News
🔢
Homomorphic Encryption
Sequential
Auditing
for f-Differential Privacy
arxiv.org
·
1d
🔒
Differential Privacy
The
barrier
to identity theft is
crumbling
s-jac.github.io
·
23h
·
Discuss:
Hacker News
🔒
Security
Why enterprise IT
modernization
matters now – and how to “
delight
by design”
breakingdefense.com
·
1d
🔐
Capability Systems
— ### Abstract Data‑sharing between healthcare
providers
is essential for evidence‑based medicine yet constrained by the General Data Protection
Regula
...
freederia.com
·
5d
🔒
Differential Privacy
What’s the Next
Frontier
for Humans After Crypto and
Blockchain
?
medium.com
·
1d
⛓️
Blockchain
The Future of Being Human: A Critical
Complementary
Investment
Thesis
indyjohar.substack.com
·
1d
·
Discuss:
Substack
🤖
Cyberpunk
Custom AI Tool Development in
Regulated
Industries: Why
Off-The-Shelf
LLM Solutions Fall Short
analyticsvidhya.com
·
1d
🎨
Design Systems
Design and missing
categories
jamesg.blog
·
2d
🏗️
Information Architecture
a free-to-use data
modeler/generator
for any database
synthforge.io
·
9h
·
Discuss:
Hacker News
🔥
DataFusion
Unique
identifiers
privacy.ca.gov
·
15h
👆
Fingerprinting
Vibe
Coding for Scientists
vibe-coding-101-iota.vercel.app
·
18h
🎭
Program Synthesis
How to Reduce
Telemetry
Volume by 40%
Smartly
newsletter.signoz.io
·
2d
·
Discuss:
Hacker News
,
r/programming
🔭
Tracing
UNC1069
Targets Cryptocurrency Sector with New
Tooling
and AI-Enabled Social Engineering
cloud.google.com
·
1d
🦠
Malware Analysis
Boundary
Engineering
cabreza.substack.com
·
4d
·
Discuss:
Substack
⚓
Anchors
Real-time infrastructure that
respects
your privacy
ephemeral.ws
·
11h
·
Discuss:
Hacker News
🔒
Digital Privacy
EU AI Act:
Practical
Risk
Classification
for Business AI Use Cases
jaikin.eu
·
2d
·
Discuss:
Hacker News
💰
TigerBeetle
A Defense in
Depth
Approach to Cloud Security
dev.to
·
3h
·
Discuss:
DEV
🌐
Network Security
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help