Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π‘οΈ Privacy Engineering
Data Minimization, Privacy by Design, Differential Privacy, GDPR
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
122017
posts in
1.57
s
Keep Your
Secrets
Safe
dev.to
Β·
32m
Β·
Discuss:
DEV
π
Cryptography
Group Note Draft:
Considerations
for
Reviewing
Differential Privacy Systems (for Non-Differential Privacy Experts)
w3.org
Β·
12h
π
Cryptography
Synergistic
Enhancement of Requirement-to-Code
Traceability
: A Framework Combining Large Language Model based Data Augmentation and an Advanced Encoder
sonomarpa.sonoma.lib.ca.us
Β·
7h
π¨
Software Engineering
Digital Omnibus: EDPB and
EDPS
support
simplification
and competitiveness while raising key concerns
edpb.europa.eu
Β·
1d
π‘οΈ
Computer Security
Risk-Equalized
Differentially Private Synthetic Data: Protecting
Outliers
by Controlling Record-Level Influence
arxiv.org
Β·
18h
π
Cryptography
D is for Data Engineering
dev.to
Β·
2d
Β·
Discuss:
DEV
π¨
Software Engineering
Privacyβs about to become
boring
, and thatβs a good thing (for those that take
note
)
techradar.com
Β·
8h
π»
Technology
HoWDe
: A
validated
algorithm for Home and Work location Detection
sciencedirect.com
Β·
13h
π€
AI
Navigating Legal and Compliance Risks When
Corporations
Expose
Sensitive Data to AI
blog.x1discovery.com
Β·
5h
π‘οΈ
Computer Security
The
Timeless
Way of
Programming
(2022)
tomasp.net
Β·
2h
Β·
Discuss:
Lobsters
,
Hacker News
π¨
Software Engineering
Beyond
Permissions
: An
Empirical
Static Analysis of Privacy and Security Risks in Children-Oriented and General-Audience Mobile Apps for Gaming
arxiv.org
Β·
18h
π»
Technology
The
Air-Gapped
Chronicles
: The Sovereign Vault
pub.towardsai.net
Β·
2h
π
Cryptography
Outcome
Engineering
o16g.com
Β·
1d
Β·
Discuss:
Hacker News
π¨
Software Engineering
Analysis of systems with dependent components through a
variance-based
index and
regression
importance signature
sciencedirect.com
Β·
7h
π¨
Software Engineering
Technical
Path and Business Model of Office Work Without People
nextbigfuture.com
Β·
7h
π¨βπ»
Solo Dev
Increasingly,
HIPAA
Canβt Stop AI from
De-Anonymizing
Patient Data
unite.ai
Β·
1d
Β·
Discuss:
Hacker News
π‘οΈ
Computer Security
How a Single Image
Uncovered
an
Entire
Digital Identity
medium.com
Β·
14h
π‘οΈ
Computer Security
GTIG
AI Threat Tracker: Distillation,
Experimentation
, and (Continued) Integration of AI for Adversarial Use
cloud.google.com
Β·
4h
Β·
Discuss:
Hacker News
π€
AI
Decoupling
Monolithic
APIs for Mobile Teams in 2026
indiit.com
Β·
12h
Β·
Discuss:
DEV
π»
Technology
(Re)
Discovering
Natural
Laws
lesswrong.com
Β·
1h
π
Cryptography
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help