Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Privacy Engineering
Data Minimization, Privacy by Design, Differential Privacy, GDPR
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
73199
posts in
1.17
s
Privacy-preserving data analysis using a
memristor
chip with
colocated
authentication and processing
science.org
·
3d
🏷️
Memory Tagging
The European
Commission
says one thing with the Digital
Omnibuses
, but does something else
bitsoffreedom.nl
·
3d
🔒
Digital Privacy
Synthesizing
Realistic
Test Data without Breaking Privacy
arxiv.org
·
4d
🎲
Deterministic Simulation
Bitcoin
PIPEs
v2
eprint.iacr.org
·
5d
💼
Thrift
Private Sum Computation:
Trade-Offs
between Communication,
Randomness
, and Privacy
arxiv.org
·
1d
🔐
Homomorphic Secret Sharing
CySecurity
News - Latest Information Security and Hacking Incidents:
Orchid
Security Launches Tool to Monitor Identity Behavior Across Business Applications
cysecurity.news
·
4d
·
Discuss:
Blogger
🔒
Security
A Guide to
OpenID
AuthZEN
's Authorization API 1.0
auth0.com
·
4d
🔒
Security
From Milan to
Liguria
: 10 of the most promising Italian startups
shaping
the next tech cycle
eu-startups.com
·
4d
🏙️
Smart Cities
My take on
transforming
data
dev.to
·
2d
·
Discuss:
DEV
🏗️
Data Modeling
The end of "trust me
bro
" -
confidential
computing for everyone
stacker.news
·
4d
🔐
SGX Enclaves
From
Prop
Drilling
to Context API😏
dev.to
·
1d
·
Discuss:
DEV
⚛️
React
Enshittification
Comes to ‘Smart’
Products
sloanreview.mit.edu
·
5d
🎨
Design Systems
From
guardrails
to governance: A CEO’s guide for
securing
agentic systems
technologyreview.com
·
5d
🛡️
AI Security
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
5d
🦠
Malware Analysis
The Future of Systems
novlabs.ai
·
3d
·
Discuss:
Hacker News
🏗️
Systems Design
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
·
4d
·
Discuss:
Substack
🛡️
AI Security
GKcodebase/API
_Architecture: API designs in
jaca
github.com
·
4d
·
Discuss:
DEV
🎨
API Design
**Abstract:** This research proposes a novel framework for adaptive hybrid threat
attribution
, leveraging multi-modal
anomaly
detection and temporal graph an...
freederia.com
·
3d
📈
Prometheus
OSINT
Case Study: Leveraging
SOCMINT
and Breach Data for Counter-Terrorism
infosecdad.medium.com
·
4d
🛡️
Cybersecurity
Building a privacy-first,
EU-hosted
AI chat in Rust (
Leptos
)
limbochat.com
·
5d
·
Discuss:
Hacker News
🔺
Delta Lake
Loading...
Loading more...
« Page 8
•
Page 10 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help