๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”Ž OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

A UK Government Order Threatens the Privacy and Security of All Internet Users
internetsociety.orgยท23h
โš–๏ธLegal Compliance
Environmental Trend Tracker with M5StickC PLUS 2
hackster.ioยท1d
๐Ÿ”ŒSingle Board PC
Decoding Timestamps: Time-Based Feature Engineering for Search & Recs
shaped.aiยท2d
๐Ÿ”ƒFeed Algorithms
Google Set Up Two Robotic Arms For a Game of Infinite Table Tennis
hardware.slashdot.orgยท13h
๐Ÿ”ฒCellular Automata
Russia suspected of hacking Dutch prosecution service systems
dutchnews.nlยท2dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Author Correction: Immune evasion through mitochondrial transfer in the tumour microenvironment
nature.comยท23h
๐ŸงฌCopy Number Variants
Scientists Report Surreal Scenes In the Worldโ€™s Most Northern Town
404media.coยท4h
๐ŸงŠArctic Storage
Starlink kept me connected to the Internet without failโ€”until Thursday
arstechnica.comยท19h
๐Ÿ•ธ๏ธMesh Networking
Google and Microsoft Trusted Them. 2.3M Users Installed Them. They Were Malware
blog.koi.securityยท1dยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation
The Age-Checked Internet Has Arrived
wired.comยท1dยท
Discuss: r/technews
๐Ÿ›กCybersecurity
Journal of Articles in Support of the Null Hypothesis
jasnh.comยท23hยท
Discuss: Hacker News
๐Ÿ“กInformation theory
So much for watermarks: UnMarker tool nukes AI provenance tags
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ’งManuscript Watermarks
Security by Design โ€” UX and AI in Modern Cybersecurity
paloaltonetworks.comยท1d
๐Ÿ“ŸCLI Design
Sticking to the Mean: Detecting Sticky Tokens in Text Embedding Models
arxiv.orgยท1d
๐Ÿ“Text Parsing
Show HN: Made a boilerplate for SaaS and Freelancers to deploy in 24h
github.comยท1dยท
Discuss: Hacker News
๐Ÿฆ‹Format Metamorphosis
Byte-Vision delivers powerful Retrieval Augmented Generation by integrating Llama.Cpp and Elasticsearch's vector search.
dev.toยท23hยท
Discuss: DEV
๐Ÿ”BitFunnel
Machine Learning Fundamentals: feature engineering
dev.toยท4dยท
Discuss: DEV
๐ŸŒŠStream Processing
Optimising Call Centre Operations using Reinforcement Learning: Value Iteration versus Proximal Policy Optimisation
arxiv.orgยท1d
๐Ÿ”ฒCellular Automata
Help with K8s Security
reddit.comยท3dยท
Discuss: r/kubernetes
๐Ÿ“ฆContainer Security
Mining Voter Behaviour and Confidence: A Rule-Based Analysis of the 2022 U.S. Elections
arxiv.orgยท4d
๐Ÿง Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap