Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 App Security
application security, encryption, secure storage, data protection
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187234
posts in
13.0
ms
Storing
Passwords
Securely
🔗
Transaction Matching
patrickmn.com
·
2h
Privacy-first mind
mapping
app. Part 3:
Encryption
Model
🎭
Anonymization
mindmapvault.com
·
6d
·
DEV
Privacy on Rails
Pragmatically
complying
with data protection laws
🛡️
Data Privacy
blog.codeminer42.com
·
9h
VECT
: Ransomware by design,
Wiper
by accident
🚀
Indie SaaS
malware.news
·
2d
Training Machine Learning Models on
Encrypted
Data: A Privacy-Preserving Framework using
Homomorphic
Encryption
🎭
Anonymization
arxiv.org
·
2d
Asiadav/OpenPBKDF2
: An open-source ASIC implementation of the PBKDF2 algorithm using SHA256 encryption
🔗
Transaction Matching
github.com
·
2h
The Ultimate Guide to
Bridging
Telegram to Matrix: No More Encryption
Headaches
🎭
Anonymization
faun.pub
·
17h
Data Protection on AWS: Building an End-to-End Encryption Strategy for S3,
RDS
, and
Lambda
🎭
Anonymization
medium.com
·
3d
The Code Doesn’t Care Who
Wrote
It: Why Context, Not AI Fear, Will
Define
Modern Application Security
🎭
Anonymization
devops.com
·
2d
Agent’s claims on
WhatsApp
access
spark
security concerns
🏦
Bank Statements
securityaffairs.com
·
10h
How AI Moves Businesses From
Damage
Control to
Near-Instant
Recovery After a Data Crisis
🔗
Transaction Matching
entrepreneur.com
·
8h
New Windows
RPC
Vulnerability Lets Attackers Escalate
Privileges
Across All Windows Versions
🎭
Anonymization
cybersecuritynews.com
·
4h
Modernizing
Backup Encryption:
Transitioning
from Self-Managed Engines to Google Cloud PostgreSQL
🔗
Transaction Matching
medium.com
·
2d
The FBI Says
Warrant-Proof
Encryption
Is A Public Safety Problem - Here's What It Means
🎭
Anonymization
slashgear.com
·
3d
Post-quantum encryption for Cloudflare
IPsec
is
generally
available
🎭
Anonymization
blog.cloudflare.com
·
13h
·
Hacker News
Wiz
Code Week Recap:
Securing
AI Native Development
🚀
Indie SaaS
wiz.io
·
1d
Discoverable
SSH based on YubiKey FIDO2 |
fernvenue
's Blog
💾
Local-First
blog.fernvenue.com
·
3h
##
LiberaForms
,
ethical
form software
🚀
Indie SaaS
liberaforms.org
·
6h
From
Rerandtopia
to
Interceptopia
, the Anamorphic Encryption Saga Rises
🎭
Anonymization
eprint.iacr.org
·
5d
The Post-Quantum Security
Timeline
for Java:
JEP
496,
JEP
527, and What Teams Should Do Now
🔗
Transaction Matching
javacodegeeks.com
·
2d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help