๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Homomorphic Encryption

Privacy-preserving Computation, Encrypted Processing, Secure Multiparty, FHE

These Security Cameras Are Subscription-Free Alternatives to Google Nest
lifehacker.comยท15h
๐Ÿ—œ๏ธLZW Variants
Enabling ESP32 Secure Boot V2 (SBV2)
hackster.ioยท1h
๐Ÿ”’Secure Boot
How Smart MSPs Sell with Compliance, Not Just Tools โ€“ With Dustin Bolander
heimdalsecurity.comยท2d
๐ŸŽฏThreat Hunting
Make Your Own Backup System โ€“ Part 1: Strategy Before Scripts
it-notes.dragas.netยท21h
๐Ÿ’ฟBackup Strategies
A distributed systems reliability glossary
antithesis.comยท3dยท
Discuss: Lobsters, Hacker News, r/programming
โœ…Archive Fixity
A PhD's Apology
cappadokes.github.ioยท2dยท
Discuss: Hacker News
๐ŸงฎTheoretical Computer Science
'A 1,000-year-plus memory crystal': SPhotonixโ€™s CEO tells us how its glass-based data tech is the future of high-density archival storage
techradar.comยท4h
๐ŸŒˆHolographic Storage
GORM Magic: Go Database Made Easy โšก
dev.toยท1dยท
Discuss: DEV
โ›๏ธSQL Archaeology
What Happens When AI Starts Writing Your APIs?
devops.comยท18h
โš™๏ธTLA+
Over 1 million records from US adoption organization left exposed online
techradar.comยท1d
๐Ÿ”“Hacking
Meta and Yandex break security to save their business model
privacyinternational.orgยท2d
๐Ÿ•ต๏ธVector Smuggling
Thoughts on External Memory for LLMs
medium.comยท20hยท
Discuss: Hacker News
โšกHardware Transactional Memory
Unleashing Vision Foundation Models for Coronary Artery Segmentation: Parallel ViT-CNN Encoding and Variational Fusion
arxiv.orgยท1d
๐Ÿค–Advanced OCR
Less Stress, More Privacy: Stress Detection on Anonymized Speech of Air Traffic Controllers
arxiv.orgยท4d
๐Ÿ“ŠQuantization
Show HN: I built an SDK for building an AI RAG app with Supabase and pgvector
github.comยท2dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Attackers Abuse AWS Cloud to Target Southeast Asian Governments
darkreading.comยท3d
๐Ÿ‘๏ธObservatory Systems
Manage multi-tenant Amazon Bedrock costs using application inference profiles
aws.amazon.comยท12h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.comยท2d
๐Ÿ”“Password Cracking
NOCTA: Non-Greedy Objective Cost-Tradeoff Acquisition for Longitudinal Data
arxiv.orgยท2d
โง—Information Bottleneck
How Kiro Transformed My Vibe Coding into Structured, Production-Ready Development
dev.toยท4hยท
Discuss: DEV
๐ŸงฑImmutable Infrastructure
Loading...Loading more...
AboutBlogChangelogRoadmap