Show HN: Anonymous Peer to Peer Therapy
apps.apple.comΒ·3dΒ·
Discuss: Hacker News
πŸ“ΊAnime
Flag this post
The Much Shortened List of My Distributed Self
zylstra.orgΒ·7h
πŸ”’Cybersecurity
Flag this post
Notes from "Tor: From the Dark Web to the Future of Privacy"
evanhahn.comΒ·16h
πŸ”’Cybersecurity
Flag this post
Children facing ICE threats need indoor sanctuaries
chicago.suntimes.comΒ·4h
πŸ”’Cybersecurity
Flag this post
SampCert: Verified Foundations for Differential Privacy (PLDI 2025)
dl.acm.orgΒ·1dΒ·
Discuss: Hacker News
πŸ”’Cybersecurity
Flag this post
I still pay for a password manager
melvinsalas.comΒ·8h
πŸ”’Cybersecurity
Flag this post
Meta’s β€˜Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.netΒ·1d
πŸ”’Cybersecurity
Flag this post
Italy and Australia are about to enforce age verification - encrypt your data for less than $3 a month
techradar.comΒ·5h
πŸ”’Cybersecurity
Flag this post
A practical guide to working with sudo
tech-couch.comΒ·16h
πŸ”’Cybersecurity
Flag this post
React demo: simple portfolio engagement widget (no fingerprinting) + llms.txt support, built to get feedback not just promo
reddit.comΒ·12hΒ·
Discuss: r/reactjs
πŸ”’Cybersecurity
Flag this post
Nym and NymVPN - Next-gen privacy with mixnet and VPN service
discuss.privacyguides.netΒ·3d
πŸ”’Cybersecurity
Flag this post
Google Wallet is getting personal in more ways than one
androidpolice.comΒ·19h
πŸ”’Cybersecurity
Flag this post
Americans Are Increasingly Alone, but Are They Lonely?
realclearinvestigations.comΒ·19hΒ·
Discuss: Hacker News
πŸ”’Cybersecurity
Flag this post
A pee before leaving
itsdougholland.comΒ·15h
πŸ”’Cybersecurity
Flag this post
How to deal with Roblox's age verification
reddit.comΒ·1dΒ·
Discuss: r/privacy
πŸ”’Cybersecurity
Flag this post
Take control of your privacy with updates on Malwarebytes for Windows
malwarebytes.comΒ·1d
πŸ”’Cybersecurity
Flag this post
Here’s what happened when my son and I turned off our screens for a day
orlandosentinel.comΒ·52m
πŸ“ΊAnime
Flag this post
Kawaiicon 3 - Day 2
rodger.donaldson.gen.nzΒ·8h
πŸ”’Cybersecurity
Flag this post
Two-Parameter R\'enyi Information Quantities with Applications to Privacy Amplification and Soft Covering
arxiv.orgΒ·3d
πŸ”’Cybersecurity
Flag this post