Feeds to Scour
SubscribedAll
Scoured 11479 posts in 1.22 s
SPDMark: Selective Parameter Displacement for Robust Video Watermarking
arxiv.orgยท11h
๐Ÿ‘๏ธPerceptual Hashing
Preview
Report Post
Acme Device Attestation Extension
datatracker.ietf.orgยท2dยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Preview
Report Post
Hack the Box Starting Point: Three
infosecwriteups.comยท1d
๐ŸŒDNS Security
Preview
Report Post
Security and Detectability Analysis of Unicode Text Watermarking Methods Against Large Language Models
arxiv.orgยท11h
๐Ÿ”คCharacter Classification
Preview
Report Post
Mage: Cracking Elliptic Curve Cryptography with Cross-Axis Transformers
arxiv.orgยท11h
๐Ÿ”ฑGalois Cryptography
Preview
Report Post
Show HN: aero.zip - I over-engineered a file transfer service (E2EE, not P2P)
aero.zipยท2dยท
Discuss: Hacker News
๐ŸบZIP Archaeology
Preview
Report Post
DNSCrypt-Server Docker Image for Enhanced Privacy and Security
dev.toยท2dยท
Discuss: DEV
๐ŸŒDNS over QUIC
Preview
Report Post
A look at an Android ITW DNG exploit
googleprojectzero.blogspot.comยท3dยท
๐Ÿ–ผ๏ธJPEG Forensics
Preview
Report Post
CIC: Circular Image Compression
arxiv.orgยท11h
๐ŸŒ€Fractal Compression
Preview
Report Post
IDA Pro String Heuristics
gabrielcybersecurity.comยท4d
โœ…Format Verification
Preview
Report Post
10 Hacks for Online Privacy That Everyone Should Know
lifehacker.comยท6d
๐Ÿ Personal Archives
Preview
Report Post
Smart Energy Efficiency and Air Quality Monitoring System
hackster.ioยท5d
๐ŸŒ€Brotli Internals
Preview
Report Post
Letโ€™s Encrypt Turns Ten
pxlnv.comยท5d
๐Ÿ”Archive Encryption
Preview
Report Post
HTTPS certificate industry phasing out less secure domain validation methods
security.googleblog.comยท5dยท
๐ŸŒDNS Security
Preview
Report Post
Evaluating GPT-5.2 Thinking: Cryptographic Challenge Case Study
irregular.comยท4dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Privacy-Preserving Active Learning for wildfire evacuation logistics networks with zero-trust governance guarantees
dev.toยท3dยท
Discuss: DEV
๐Ÿ”’Privacy Preserving
Preview
Report Post
Semantic Reconstruction of Adversarial Plagiarism: A Context-Aware Framework for Detecting and Restoring "Tortured Phrases" in Scientific Literature
arxiv.orgยท4d
๐Ÿ”BitFunnel
Preview
Report Post
The Eminence in Shadow: Exploiting Feature Boundary Ambiguity for Robust Backdoor Attacks
arxiv.orgยท4d
๐Ÿ”Vector Forensics
Preview
Report Post
LLM Prompt Engineering: A Practical Guide to Not Getting Hacked
dev.toยท4dยท
Discuss: DEV
๐ŸงชBinary Fuzzing
Preview
Report Post
VocSim: A Training-free Benchmark for Zero-shot Content Identity in Single-source Audio
arxiv.orgยท4d
๐ŸŽงLearned Audio
Preview
Report Post