🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Differential Privacy

Privacy Preserving Analytics, Noise Addition, Statistical Disclosure

A Cheap Smart Plug To Block Distractions
hackaday.com·2d
🏠Home Automation
Why This Old Python Performance Trick Doesn’t Matter Anymore
blog.codingconfessions.com·23h
🚀Compiler Optimizations
Toward Environmentally Equitable AI
cacm.acm.org·3d
🔲Cellular Automata
Scientists Turn E-Waste Into Pure Gold Using Pool Cleaner and Sunlight
scitechdaily.com·12h
🧪Cassette Chemistry
The AI Memory Wallet Fallacy
blog.getzep.com·4d·
Discuss: Hacker News
💾Persistence Strategies
Show HN: Neural network digit recognition on a Game Boy
github.com·21h·
Discuss: Hacker News
🎮GameBoy Architecture
OpenAI Agents SDK (TS): voice and multi-agent framework, MIT-licensed
github.com·14h·
Discuss: Hacker News
🔓Open Source Software
AI Is Dehumanization Technology
thedabbler.patatas.ca·2d·
Discuss: Hacker News
🔲Cellular Automata
How To Use European Air Polution Data To Hold Companies Accountable
exposingtheinvisible.org·1d
⚖️Legal Compliance
YC AI Startup School 2025 – Highlights
chipinsights.substack.com·1d·
Discuss: Substack
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
MinQND-Libc – Minimal Libc for WebAssembly
github.com·21h·
Discuss: Hacker News
⚙️PL Implementation
Android 16 will soon flag fake cell towers and warn you if someone is spying on your phone
techradar.com·2h
📦Container Security
What exactly is a smart home? 3 things you need to know to get started
techradar.com·1d
🏠Home Automation
Machine Learning Fundamentals: accuracy with python
dev.to·4d·
Discuss: DEV
👁️Observatory Systems
Enabling PSO-Secure Synthetic Data Sharing Using Diversity-Aware Diffusion Models
arxiv.org·5d
🔒Homomorphic Compression
"TikTok, Do Your Thing": User Reactions to Social Surveillance in the Public Sphere
arxiv.org·2d
🏛Digital humanities
My 8-Hour Reality Check: Coding with DeepSeek-R1-0528
dev.to·18h·
Discuss: DEV
🎯Emulator Accuracy
RecCoT: Enhancing Recommendation via Chain-of-Thought
arxiv.org·2d
🔍Information Retrieval
Large Language Model Deployment Tools You Need to Know in 2025
medium.com·1h·
Discuss: Hacker News
🏠Homelab Orchestration
Shadow defense against gradient inversion attack in federated learning
arxiv.org·6d
🕵️Vector Smuggling
Loading...Loading more...
AboutBlogChangelogRoadmap