🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ’§ Digital Watermarking

Steganography, Copyright Protection, Archive Authentication, Invisible Metadata

Walters: The Golden State was a model of transparency. Now it operates in the dark.
mercurynews.comΒ·1d
πŸ”Archive Encryption
Trialing Far UVC and Glycol Vapors at BIDA
jefftk.comΒ·2d
πŸ“»Homebrew Protocols
To monitor my backups, I had to first invent the universe
blog.tjll.netΒ·2d
πŸ“ŠHomelab Monitoring
NextDNS adds an option to bypass age verification on websites
ghacks.netΒ·1d
🌐DNS over QUIC
Drug Cartels Are the New APTs
news.risky.bizΒ·3d
πŸ”“Hacking
Get Org.apache.xml.security Working with GraalVM
guust.ysebie.beΒ·3dΒ·
Discuss: Hacker News
πŸ›‘οΈWebAssembly Security
Office on HP-UX and Unix
openpa.netΒ·12hΒ·
Discuss: Hacker News
πŸ“ŸTerminal Typography
Building a Simple AI DAW
blog.jonaylor.comΒ·2dΒ·
Discuss: Hacker News
🎧Learned Audio
6 Bit DNA Encoding with Complements via XOR (biowisdom)
cyberwarhead.comΒ·2d
🧬Palindrome Codes
Native capture: why it’s non-negotiable for modern compliance teams
techradar.comΒ·2d
βš–οΈLegal Compliance
A LeetCode Discussion: Coin Change Problems
dev.toΒ·14hΒ·
Discuss: DEV
βš”οΈLean Tactics
Bistochastically private release of longitudinal data
arxiv.orgΒ·2d
πŸ›‘οΈDifferential Privacy
Title: Meta's Approach to Superintelligence: Keeping Control with AI Models
dev.toΒ·6hΒ·
Discuss: DEV
πŸ€–AI Curation
Hackaday Podcast Episode 333: Nightmare Whiffletrees, 18650 Safety, and a Telephone Twofer
hackaday.comΒ·1d
πŸ§ͺCassette Hacks
CarAT: Carbon Atom Tracing across Industrial Chemical Value Chains via Chemistry Language Models
arxiv.orgΒ·2d
πŸ•ΈοΈAlgebraic Topology
Self-Assembling RNA Compartments: Predictive Modeling of Phase Diagram Dynamics for Targeted Delivery
dev.toΒ·14hΒ·
Discuss: DEV
πŸ’ŽInformation Crystallography
A non-uniform view of Craig interpolation in modal logics with linear frames
arxiv.orgΒ·3d
πŸ”—Combinatory Logic
Layer-Wise Analysis of Self-Supervised Representations for Age and Gender Classification in Children's Speech
arxiv.orgΒ·2d
πŸŽ™οΈWhisper
Deep Ignorance: Filtering Pretraining Data Builds Tamper-Resistant Safeguards into Open-Weight LLMs
arxiv.orgΒ·5d
πŸ’»Local LLMs
From Prediction to Explanation: Multimodal, Explainable, and Interactive Deepfake Detection Framework for Non-Expert Users
arxiv.orgΒ·5d
πŸ“ŠLearned Metrics
Loading...Loading more...
AboutBlogChangelogRoadmap