Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Privacy Engineering
Data Minimization, Privacy by Design, Differential Privacy, GDPR
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74618
posts in
320.2
ms
CySecurity
News - Latest Information Security and Hacking Incidents:
Orchid
Security Launches Tool to Monitor Identity Behavior Across Business Applications
cysecurity.news
·
4d
·
Discuss:
Blogger
🔒
Security
DNA
provides
a solution to our
enormous
data storage problem
phys.org
·
4d
🔢
Homomorphic Encryption
From Milan to
Liguria
: 10 of the most promising Italian startups
shaping
the next tech cycle
eu-startups.com
·
3d
🏙️
Smart Cities
Microsoft Releases
Crescent
Cryptographic
Library
i-programmer.info
·
4d
🔒
Tetragon
From
Prop
Drilling
to Context API😏
dev.to
·
1d
·
Discuss:
DEV
⚛️
React
Enshittification
Comes to ‘Smart’
Products
sloanreview.mit.edu
·
4d
🎨
Design Systems
Building
Reliable
AI Applications: A
Validation
Strategy
dev.to
·
1d
·
Discuss:
DEV
🦙
Ollama
February 5,2026
buttondown.com
·
4d
✨
Gleam
From
guardrails
to governance: A CEO’s guide for
securing
agentic systems
technologyreview.com
·
5d
🛡️
AI Security
ClawdBot Security, Security
Scorecards
, Threat Framework for
SDLC
Infrastructure
tldrsec.com
·
4d
🦅
Falco
Fundamental
emerges from stealth with first major foundation model trained for
tabular
data
venturebeat.com
·
4d
💰
TigerBeetle
An introduction to local
differential
privacy
protocols
using block designs
arxiv.org
·
5d
🔒
Differential Privacy
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
4d
🦠
Malware Analysis
Privacy
Amplification
by Missing Data
arxiv.org
·
6d
🔒
Differential Privacy
Privacy score that
proves
your image has no hidden
metadata
exif-cleaner.com
·
5d
·
Discuss:
Hacker News
👆
Fingerprinting
Soft-Skill
Attacks: How Social Engineering
Bypasses
Security Controls
zeroday.forem.com
·
4d
·
Discuss:
DEV
🔒
Security
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
·
3d
·
Discuss:
Substack
🛡️
AI Security
Samsar4/Ethical-Hacking-Labs
: Practical
Ethical
Hacking Labs 🗡🛡
github.com
·
3d
🛡️
Cybersecurity
a
proposal
for AI that's on your side
r.github.io
·
3d
·
Discuss:
Hacker News
🛡️
AI Security
*Hierarchical Physics‑Informed Surrogate Modeling and Reinforcement‑Learning Optimization for Multi‑Scale Energy Dissipation in 3‑D Printed
Functionally
Graded
Composite Beams under Dynamic Loading*
freederia.com
·
3d
⚓
Anchors
Loading...
Loading more...
« Page 8
•
Page 10 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help