๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽต Audio Hashing

Perceptual Hashing, Acoustic Fingerprinting, Content Identification, Signal Matching

Are we solving digital identity or revealing we've lost what we're proving?
syntheticauth.aiยท16hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Towards Low-Latency Tracking of Multiple Speakers With Short-Context Speaker Embeddings
arxiv.orgยท2d
๐ŸŽตAcoustic Fingerprinting
Enhanced Lattice Vibration Characterization via Dynamic Modal Analysis and Adaptive Filtering
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠDigital Signal Processing
My A-Z toolbox: dcfldd
rubenerd.comยท13h
๐Ÿ“‹DFDL
Derek Elkins: Arithmetic Functions
hedonisticlearning.comยท14h
โš”๏ธLean Theorem
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
hackaday.comยท23h
๐Ÿ”“Hacking
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comยท22h
๐Ÿ”Cryptographic Archaeology
An inner-speech decoder reveals some mental privacy issues
arstechnica.comยท2h
๐ŸŽงLearned Audio
Shotcut is a free and open-source video editor, available for all major platforms
techspot.comยท17h
๐ŸŽฌVideo Codecs
A universal rhythm guides how we speak: Global analysis reveals 1.6-second 'intonation units'
phys.orgยท2d
๐Ÿ—ฃ๏ธCMU Pronouncing
Major raid targets counterfeit fake HDDs from Seagate, WD, and Toshiba in Malaysia, but is it too little too late?
techradar.comยท1d
๐Ÿ’ฟDAT Forensics
Show HN: Novel GPT-2 sampling and memory architecture
github.comยท4hยท
Discuss: Hacker News
๐Ÿ’ŽInformation Crystallography
Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses
tenable.comยท1d
๐Ÿ”“Hacking
Deep Dive: OpenAI's GPT-OSS
dev.toยท10hยท
Discuss: DEV
๐Ÿ“ŠQuantization
Voice Changing Sound Recorder
hackster.ioยท2d
๐Ÿ“ผTape Simulation
Denoising by neural network for muzzle blast detection
arxiv.orgยท1d
๐ŸŒŠDigital Signal Processing
Over 300 entities hit by a variant of Atomic macOS Stealer in recent campaign
securityaffairs.comยท6h
๐ŸŽซKerberos Attacks
Cracking the Density Code: Why MAF Flows Where KDE Stalls
towardsdatascience.comยท20h
๐Ÿ”—Tailscale
My favorite Google AI features from the Pixel 10 launch
engadget.comยท1d
๐ŸŽงLearned Audio
My Zip Isn't Your Zip: Identifying and Exploiting Semantic Gaps Between Parsers
usenix.orgยท2dยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Loading...Loading more...
AboutBlogChangelogRoadmap