🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌊 Audio Watermarks

Steganography, Copyright Protection, Inaudible Metadata, Signal Embedding

Police issue warning over ‘blasters’ used to send scam texts to nearby phones
the-independent.com·7h
🏴‍☠️Piracy
Is this video of a Tehran prison explosion AI-generated?
abc.net.au·1d
🎞️MKV Analysis
[$] Libxml2's "no security embargoes" policy
lwn.net·8h
🔓Free and open source
Introducing Creative Commons Signals: A New Social Contract for the Age of AI
creativecommons.org·40m·
Discuss: Lobsters, Hacker News
🧭Content Discovery
How keys are used in FileVault and encryption
eclecticlight.co·17h·
Discuss: Lobsters, Hacker News
💣Compression Security
Unsupervised Learning NO. 486
newsletter.danielmiessler.com·2d
🕵️Vector Smuggling
Announcing crabstep: A pure Rust, cross-platform, zero-dependency Apple/NeXTSTEP typedstream deserializer
github.com·7h
🔒Linear Types
You might not be getting the highest quality audio when listening to music on your phone – here's how to change that
techradar.com·2d
🎵Audio Codecs
The Internal Inconsistency of Large Language Models
blog.kortlepel.com·1d·
Discuss: Hacker News
💻Local LLMs
Learning High-Quality Latent Representations for Anomaly Detection and Signal Integrity Enhancement in High-Speed Signals
arxiv.org·1d
🧠Machine Learning
Why Your Next LLM Might Not Have A Tokenizer
towardsdatascience.com·1d
🤖Grammar Induction
The Art of Deception: Understanding Generative Adversarial Networks (GANs)
dev.to·21h·
Discuss: DEV
🧠Neural Compression
I built my podcast (with AI)
letterstome.cc·2d·
Discuss: Hacker News
📼DAT Archives
Let Your Video Listen to Your Music!
arxiv.org·1d
🎧Vorbis Encoding
Towards Interpretable Adversarial Examples via Sparse Adversarial Attack
arxiv.org·1d
🕵️Vector Smuggling
Apple AirPods pro 2’s noise cancelling is still so impressive, I couldn’t hear myself type this review
the-independent.com·7h
👂Psychoacoustics
Deep-OFDM: Neural Modulation for High Mobility
arxiv.org·1d
🧠Neural Codecs
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.to·2h·
Discuss: DEV
🔗Data Provenance
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔢Bitwise Algorithms
How much slower is random access, really?
samestep.com·2d·
Discuss: Hacker News
📼Tape Encoding
Loading...Loading more...
AboutBlogChangelogRoadmap