🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌊 Audio Watermarks

Steganography, Copyright Protection, Inaudible Metadata, Signal Embedding

A Nested Watermark for Large Language Models
arxiv.orgΒ·1d
πŸ’§Manuscript Watermarks
Show HN: TableSprint- Supabase alternative with vibe coding features
tablesprint.comΒ·11hΒ·
Discuss: Hacker News
πŸ“²Digitization
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·2h
🦠Malware Analysis
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.toΒ·51mΒ·
Discuss: DEV
🧠Machine Learning
AI music, the next IP battleground
aardvark.co.nzΒ·1d
πŸ“žWebRTC
Piano Place Hold in Am music video
hypertexthero.comΒ·1d
🌈Spectral Audio
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.comΒ·20h
πŸ’ΏOptical Forensics
You might not be getting the highest quality audio when listening to music on your phone – here's how to change that
techradar.comΒ·1d
🎡Audio Codecs
HackRF Pro Pre-Order: Frequency Range and RF Performance Improvements, USB-C, TCXO Added
rtl-sdr.comΒ·12h
πŸ“žWebRTC
How keys are used in FileVault and encryption
eclecticlight.coΒ·8hΒ·
Discuss: Lobsters
πŸ’£Compression Security
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·17h
πŸ”—Data Provenance
A Robust Method for Pitch Tracking in the Frequency Following Response using Harmonic Amplitude Summation Filterbank
arxiv.orgΒ·10h
🌈Spectral Audio
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·9h
🌊Stream Ciphers
How the Music Industry is Building the Tech to Hunt Down AI-Generated Songs
entertainment.slashdot.orgΒ·2d
🎡Acoustic Fingerprinting
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgΒ·12hΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgΒ·18hΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
Digital Forensics Round-Up, June 25 2025
forensicfocus.comΒ·22m
πŸ”¬Archive Forensics
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·6h
πŸ”NTLM Forensics
Just say no to NO FAKES Act, EFF argues
theregister.comΒ·17h
βš–οΈDigital Evidence
Russia-linked APT28 use Signal chats to target Ukraine official with malware
securityaffairs.comΒ·1d
πŸ•΅οΈVector Smuggling
Loading...Loading more...
AboutBlogChangelogRoadmap