Feeds to Scour
SubscribedAll
Scoured 15571 posts in 617.0 ms
Differential Privacy on Affine Manifolds: Geometrically Confined Privacy in Linear Dynamical Systems
arxiv.orgยท1h
๐Ÿ”’Privacy Preserving
Preview
Report Post
Efficient Privacy-Preserving Retrieval Augmented Generation with Distance-Preserving Encryption
arxiv.orgยท1d
๐Ÿ”Homomorphic Encryption
Preview
Report Post
Reducing Privacy Code Review Overhead With Privacy-Relevant Methods
hackernoon.comยท22h
๐Ÿ”Privacy Codecs
Preview
Report Post
Privacy-Preserving Active Learning for heritage language revitalization programs with zero-trust governance guarantees
dev.toยท20hยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
Preview
Report Post
Privacy-first AI art, zero data stored
redhorseoracle.comยท11hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
Preview
Report Post
Redacting Faces, People, Vehicles, and Plates with Amped Replay Assisted Redaction
blog.ampedsoftware.comยท15h
๐ŸงชArchive Fuzzing
Preview
Report Post
Treat Data Like Hazardous Material: Risks of Over-Collection and Retention
lmgsecurity.comยท2h
๐Ÿ”—Data Provenance
Preview
Report Post
Quantum cryptography beyond key distribution: Theory and experiment
link.aps.orgยท23h
๐Ÿ”Quantum Cryptography
Preview
Report Post
Ensemble Listening Model (ELM): State-of-the Art Foundation Model Accuracy. A Fraction of the Cost.
ensemblelisteningmodel.comยท1dยท
Discuss: Hacker News
๐ŸŽตAudio ML
Preview
Report Post
Technical Post: How we created a blind signatures model to anonymize user API requests
wardblog.substack.comยท2dยท
Discuss: Substack
๐Ÿ”’Privacy Preserving
Preview
Report Post
Schroedingerโ€™s data: SRB and the Digital Omnibus
europeanlawblog.euยท1d
โš–๏ธLegal Compliance
Preview
Report Post
RD-03 Smart Presence Detection
hackster.ioยท2d
๐ŸŽฏThreat Hunting
Preview
Report Post
What AI Accountability Looks Like (I Built It)
forgeforward.substack.comยท10hยท
Discuss: Substack
๐Ÿค–AI Curation
Preview
Report Post
Threat hunters canโ€™t waste time stumbling in the dark โ€“ they need real observability
techradar.com
ยท1d
๐ŸŽฏThreat Hunting
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.comยท18h
๐Ÿ“ŠStatic Analysis
Preview
Report Post
Privacy Engineering at Scale: Building Automated Data Retention Systems
medium.comยท3dยท
Discuss: Hacker News
๐Ÿ›ก๏ธPreservation Proofs
Preview
Report Post
New York Privacy Act
consumerprivacyact.comยท1dยท
Discuss: Hacker News
โš–๏ธLegal Compliance
Preview
Report Post
The Problem with Lying Is Keeping Track of All the Lies
materialize.comยท2dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Alice and Bob in Wonderland - Identity and authority without servers (2024)
herbcaudill.comยท1dยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Preview
Report Post
You signed an AI privacy policy. What did you agree to?
email.projectliberty.ioยท1dยท
Discuss: Hacker News
๐Ÿ”คEBCDIC Privacy
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help