๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’ง Digital Watermarking

Steganography, Copyright Protection, Archive Authentication, Invisible Metadata

Mark Gurman Responds to Last Week's Apple Device Leaks
macrumors.comยท15h
๐ŸŽApple Archive
Weeknote: 17 August 2025 โ€“ using an iPad for work, cloud accounts, and whatโ€™s wrong with Apple
reverttosaved.comยท13hยท
Discuss: reverttosaved.com
๐ŸŽApple Computing
New trends in phishing and scams: how AI and social media are changing the game
securelist.comยท4d
๐ŸŽซKerberos Attacks
Last Week on My Mac: Drought and neural engines
eclecticlight.coยท22h
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Phishing Training Is Pretty Pointless, Researchers Find
it.slashdot.orgยท21h
๐Ÿ›กCybersecurity
A programmer's field guide to assertions
typesanitizer.comยท20hยท
Discuss: Lobsters
๐Ÿ“œProof Carrying Code
I Asked AI to Invent the Perfect Political System. Here's What It Created
wisewolfmedia.substack.comยท1hยท
Discuss: Substack
๐ŸŒCultural Algorithms
Congestion Control at IETF 123
potaroo.netยท2d
๐Ÿ“กNetwork Calculus
Show HN: A iOS Native Bluesky App
github.comยท8hยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Defending a City from Multi-Drone Attacks: A Sequential Stackelberg Security Games Approach
arxiv.orgยท1h
๐ŸŽฏThreat Hunting
CSNR and JMIM Based Spectral Band Selection for Reducing Metamerism in Urban Driving
arxiv.orgยท1h
๐ŸŒˆColor Science
Major crackdown freezes over $300 million in cryptocurrency stolen from scams
techradar.comยท16h
๐Ÿ”—Hash Chains
SPG: Style-Prompting Guidance for Style-Specific Content Creation
arxiv.orgยท1h
๐Ÿ–ผ๏ธJPEG XL
Perfect Counterfactuals in Imperfect Worlds: Modelling Noisy Implementation of Actions in Sequential Algorithmic Recourse
arxiv.orgยท1h
๐Ÿ“ผTape Combinators
Whatโ€™s in your wallet?
johndcook.comยท1d
๐ŸŒณArchive Merkle Trees
A Sub-Pixel Multimodal Optical Remote Sensing Images Matching Method
arxiv.orgยท3d
๐Ÿ“„OCR
Hackers exploit Microsoft flaw to breach Canada โ€™s House of Commons
securityaffairs.comยท3d
๐Ÿ”“Hacking
G-CUT3R: Guided 3D Reconstruction with Camera and Depth Prior Integration
arxiv.orgยท1h
๐Ÿ“Projective Geometry
Eric Topol warns that dozens of fake cookbooks and health guides misuse his identity on Amazon
the-decoder.comยท1d
๐Ÿ›Digital humanities
STAMP: Multi-pattern Attention-aware Multiple Instance Learning for STAS Diagnosis in Multi-center Histopathology Images
arxiv.orgยท3d
๐ŸงฎVector Embeddings
Loading...Loading more...
AboutBlogChangelogRoadmap