๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒŠ Audio Watermarks

Steganography, Copyright Protection, Inaudible Metadata, Signal Embedding

How Secure Is a Generative AI Voice Bot for Your Operations?
dev.toยท15hยท
Discuss: DEV
๐Ÿ‘‚Audio Evidence
Cambridge Audio's affordable earbuds deliver lossless and LDAC through Class AB amps
techradar.comยท15h
๐ŸŽตAudio Codecs
Show HN: A free tool to extract audio from video
extractaudio.proยท1dยท
Discuss: Hacker News
๐ŸŽงFLAC Encoding
Your Listens - ListenBrainz
listenbrainz.orgยท14h
๐ŸŒˆSpectral Audio
Lightweight Target-Speaker-Based Overlap Transcription for Practical Streaming ASR
arxiv.orgยท19h
๐ŸŽ™๏ธWhisper
30 Days of Malware Analysis - What trends can be observed?
cstromblad.comยท10h
๐Ÿฆ Malware Analysis
Music copyright, how many sucks of the sav?
aardvark.co.nzยท1d
๐Ÿดโ€โ˜ ๏ธPiracy
Creative Commons Introduces CC Signals: A New Social Contract for the Age of AI
creativecommons.orgยท1hยท
Discuss: Hacker News
โš–๏ธEmulation Ethics
Orange Me2eets: We made an end-to-end encrypted video calling app and it was easy
blog.cloudflare.comยท9hยท
Discuss: Hacker News
๐Ÿ“žWebRTC
Spooky Action, Real Results: Turning Quantum Weirdness Into Secure Random Numbers
scitechdaily.comยท1h
๐Ÿ”Quantum Security
How to find Brother printer, scanner and label maker devices on your network
runzero.comยท1h
๐Ÿ’ฃZIP Vulnerabilities
The AI Arms Race: When Attackers Leverage Cutting-Edge Tech
blog.checkpoint.comยท10h
๐Ÿ•ต๏ธVector Smuggling
Ripping CDs the old way
thefoggiest.devยท23h
๐Ÿ“ผCassette Archaeology
The Three Kinds of Phone Hacks to Watch Out For
lifehacker.comยท8h
๐Ÿ”“Hacking
Show HN: TableSprint- Supabase alternative with vibe coding features
tablesprint.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฒDigitization
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.comยท2d
๐Ÿ’ฟOptical Forensics
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท1d
๐Ÿฆ Malware Analysis
Judge Alsup: Training AI On Copyrighted Works? Fair Use. Building Pirate Libraries? Not So Much
techdirt.comยท7h
โš–๏ธEmulation Ethics
A Nested Watermark for Large Language Models
arxiv.orgยท2d
๐Ÿ’งManuscript Watermarks
Hackers deploy fake SonicWall VPN App to steal corporate credentials
securityaffairs.comยท1d
๐ŸŽซKerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap