Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.toยท12hยท
Discuss: DEV
๐Ÿ”Homomorphic Encryption
Flag this post
The internet was made for privacy
doctorow.medium.comยท5h
๐ŸงฒMagnetic Philosophy
Flag this post
Toward provably private insights into AI use
research.googleยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธDifferential Privacy
Flag this post
Show HN: Ellipticc Drive โ€“ open-source cloud drive with E2E and PQ encryption
ellipticc.comยท1dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Flag this post
EY Exposes 4TB SQL Server Backup Publicly on Microsoft Azure
securityaffairs.comยท11h
๐Ÿ›กCybersecurity
Flag this post
Proton's new observatory reveals over 100 billion records breached - here's what you need to know
techradar.comยท4h
๐Ÿ”Archive Cryptanalysis
Flag this post
Privacy Risks of 1x Neo Robot
captaincompliance.comยท3hยท
Discuss: Hacker News
๐Ÿ Home Automation
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.toยท1dยท
Discuss: DEV
๐Ÿ”ฒLattice Cryptography
Flag this post
Notes from RIPE 91
blog.apnic.netยท23h
๐ŸŒDNS over QUIC
Flag this post
Stochastic computing
scottlocklin.wordpress.comยท5h
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Flag this post
AI and the strengthening of records management approaches
thinkingrecords.co.ukยท1d
๐Ÿ“Archive Calculus
Flag this post
IT security expert from KIT: "I'm significantly more nervous about health data"
heise.deยท2d
๐Ÿ”Homomorphic Encryption
Flag this post
When AI Accelerates Cloud Migrations, Don't Let Security Be an Afterthought
rapid7.comยท9h
๐Ÿ”Capability Systems
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2h
๐Ÿ”“Hacking
Flag this post
The Hidden Cost of Cloud Storage: What 400+ IT Leaders Wish They Knew Sooner
backblaze.comยท1d
๐Ÿ’ฐArchive Economics
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comยท1d
๐Ÿ”Quantum Security
Flag this post
Cyber's Role in the Rapid Rise of Digital Authoritarianism
darkreading.comยท13h
๐Ÿ”“Hacking
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐Ÿฆ Parasitic Storage
Flag this post
Technology Short Take 189
blog.scottlowe.orgยท9h
๐Ÿ Homelab Archaeology
Flag this post