Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ก๏ธ Privacy Engineering
Data Minimization, Privacy by Design, Differential Privacy, GDPR
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74323
posts in
712.9
ms
The European
Commission
says one thing with the Digital
Omnibuses
, but does something else
bitsoffreedom.nl
ยท
3d
๐
Digital Privacy
Privacy-preserving data analysis using a
memristor
chip with
colocated
authentication and processing
science.org
ยท
3d
๐ท๏ธ
Memory Tagging
Differential Privacy + Synthetic Data in 2026: Hands-on Python Tutorial to Build
Bulletproof
AI
Pipelines
dev.to
ยท
4d
ยท
Discuss:
DEV
๐
Differential Privacy
Bitcoin
PIPEs
v2
eprint.iacr.org
ยท
4d
๐ผ
Thrift
CySecurity
News - Latest Information Security and Hacking Incidents:
Orchid
Security Launches Tool to Monitor Identity Behavior Across Business Applications
cysecurity.news
ยท
3d
ยท
Discuss:
Blogger
๐
Security
From
Prop
Drilling
to Context API๐
dev.to
ยท
23h
ยท
Discuss:
DEV
โ๏ธ
React
DNA
provides
a solution to our
enormous
data storage problem
phys.org
ยท
4d
๐ข
Homomorphic Encryption
Enshittification
Comes to โSmartโ
Products
sloanreview.mit.edu
ยท
4d
๐จ
Design Systems
From Milan to
Liguria
: 10 of the most promising Italian startups
shaping
the next tech cycle
eu-startups.com
ยท
3d
๐๏ธ
Smart Cities
Microsoft Releases
Crescent
Cryptographic
Library
i-programmer.info
ยท
3d
๐
Tetragon
The end of "trust me
bro
" -
confidential
computing for everyone
stacker.news
ยท
3d
๐
SGX Enclaves
February 5,2026
buttondown.com
ยท
4d
โจ
Gleam
From
guardrails
to governance: A CEOโs guide for
securing
agentic systems
technologyreview.com
ยท
5d
๐ก๏ธ
AI Security
SIDeR
: Semantic Identity Decoupling for
Unrestricted
Face Privacy
arxiv.org
ยท
3d
๐
Differential Privacy
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
ยท
4d
๐ฆ
Malware Analysis
The Future of Systems
novlabs.ai
ยท
2d
ยท
Discuss:
Hacker News
๐๏ธ
Systems Design
Phantom Transfer: Data-level
Defences
are
Insufficient
Against Data Poisoning
arxiv.org
ยท
3d
๐
Binary Exploitation
Soft-Skill
Attacks: How Social Engineering
Bypasses
Security Controls
zeroday.forem.com
ยท
3d
ยท
Discuss:
DEV
๐
Security
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
ยท
3d
ยท
Discuss:
Substack
๐ก๏ธ
AI Security
GKcodebase/API
_Architecture: API designs in
jaca
github.com
ยท
3d
ยท
Discuss:
DEV
๐จ
API Design
Loading...
Loading more...
« Page 6
โข
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help