๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”Š Acoustic Forensics

Sound Authentication, Audio Evidence, Historical Voice Recovery, Frequency Analysis

Bob's Confetti: Phonetic Memorization Attacks in Music and Video Generation
arxiv.orgยท1d
๐Ÿ—ฃ๏ธCMU Pronouncing
Show HN: UniversalBit โ€“ A new binary protocol to connect voice, video and DNA
github.comยท22hยท
Discuss: Hacker News
๐Ÿ‘‚Audio Evidence
Digital Forensics Round-Up, July 23 2025
forensicfocus.comยท2d
๐ŸšจIncident Response
2025-07-25: Feature Engineering with Shallow Features and Methods
ws-dl.blogspot.comยท1dยท
Discuss: ws-dl.blogspot.com
๐Ÿง Machine Learning
Dutch researchers use heartbeat detection to unmask deepfakes
computerweekly.comยท1dยท
Discuss: Hacker News
๐Ÿ‘‚Audio Evidence
Pedalling for peace
rfi.frยท1h
๐ŸŽงWAV Metadata
Famed Wanamaker Organ will again be heard by the public in fall art series in Philadelphia
the-independent.comยท13h
๐Ÿ•ฏ๏ธWax Cylinders
Rรฉsumรฉ
dylanfitzgerald.netยท1d
๐Ÿฆ‹Format Metamorphosis
A Modern Version of Famous, Classic Speaker
hackaday.comยท3h
๐Ÿ•ฏ๏ธWax Cylinders
Tuning Detections isnโ€™t Hard Unless You Make it Hard
infosecwriteups.comยท1d
๐ŸŽฏThreat Hunting
The ฮ—ะพmะพgraph Illusion: Not Everything Is As It Seems
unit42.paloaltonetworks.comยท11h
๐ŸŽซKerberos Exploitation
Show HN: I missed a $2M deal due to bad notes, so I built this
apps.apple.comยท17hยท
Discuss: Hacker News
๐Ÿ’ฟFLAC Archaeology
Researchers demonstrate first bidirectional asymmetric frequency conversion in a single system
phys.orgยท18h
๐Ÿ“กFrequency Archaeology
How adding user friction helps prevent fraud
fingerprint.comยท16h
๐ŸŽฏThreat Hunting
How to prepare for a Mac device security audit
jamf.comยท1d
๐Ÿ”—Data Provenance
Finding entities with given uuids in the current project
mbork.plยท1h
๐Ÿ—„๏ธDatabase Internals
Michael Ossmann Gives A First Look at the HackRF Pro in YouTube Video
rtl-sdr.comยท7h
๐Ÿ“ปHomebrew Protocols
Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access
securityaffairs.comยท12h
๐Ÿ”“Hacking
<p>Just for the record, I&rsquo;m not going to stop using em dashes just because LLMs use them too. But to proove my authenticity, I&rsquo;ll occasionally use &...
lmika.orgยท10h
๐Ÿ–‹Typography
AI's Rapid Role in Spotting Fake News
dev.toยท8hยท
Discuss: DEV
๐Ÿ“ฐRSS Reading Practices
Loading...Loading more...
AboutBlogChangelogRoadmap