Feeds to Scour
SubscribedAll
Scoured 15555 posts in 691.0 ms
Differential Privacy on Affine Manifolds: Geometrically Confined Privacy in Linear Dynamical Systems
arxiv.orgยท3h
๐Ÿ›ก๏ธDifferential Privacy
Preview
Report Post
Efficient Privacy-Preserving Retrieval Augmented Generation with Distance-Preserving Encryption
arxiv.orgยท1d
๐Ÿ”Homomorphic Encryption
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.comยท20h
๐Ÿ“ŠStatic Analysis
Preview
Report Post
Alice and Bob in Wonderland - Identity and authority without servers (2024)
herbcaudill.comยท1dยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Preview
Report Post
Privacy-Preserving Active Learning for heritage language revitalization programs with zero-trust governance guarantees
dev.toยท22hยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
Preview
Report Post
What does data ownership really mean?
prepend.comยท1d
๐Ÿ”—Data Provenance
Preview
Report Post
What Is Data Leakage
securityscorecard.comยท14h
๐Ÿ•ณ๏ธInformation Leakage
Preview
Report Post
Quantum cryptography beyond key distribution: Theory and experiment
link.aps.orgยท1d
๐Ÿ”Quantum Cryptography
Preview
Report Post
Privacy-first AI art, zero data stored
redhorseoracle.comยท13hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
Preview
Report Post
FEATURE - Building Frameworks for Long-Term Digital Preservation
infotoday.comยท1d
๐Ÿ›๏ธOAIS Implementation
Preview
Report Post
Treat Data Like Hazardous Material: Risks of Over-Collection and Retention
lmgsecurity.comยท4h
๐Ÿ”—Data Provenance
Preview
Report Post
Privacy Engineering at Scale: Building Automated Data Retention Systems
medium.comยท3dยท
Discuss: Hacker News
๐Ÿ›ก๏ธPreservation Proofs
Preview
Report Post
Technical Post: How we created a blind signatures model to anonymize user API requests
wardblog.substack.comยท2dยท
Discuss: Substack
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Four priorities for AI-powered identity and network access security in 2026
microsoft.comยท1d
๐Ÿ Homelab Automation
Preview
Report Post
Kolmogorov Complexity
en.wikipedia.orgยท20hยท
Discuss: Hacker News
๐ŸงฎKolmogorov Complexity
Preview
Report Post
CAP Theorem Explained: Beyond the "Pick Two" Myth
blog.ahmazin.devยท1hยท
Discuss: Hacker News
๐ŸคConsensus Algorithms
Preview
Report Post
Threat hunters canโ€™t waste time stumbling in the dark โ€“ they need real observability
techradar.com
ยท1d
๐ŸŽฏThreat Hunting
Preview
Report Post
Human-Aligned Decision Transformers for planetary geology survey missions with zero-trust governance guarantees
dev.toยท10hยท
Discuss: DEV
๐ŸคConsensus Networks
Preview
Report Post
Secret Management with SOPS
unixorn.github.ioยท2d
๐Ÿ”Archive Encryption
Preview
Report Post
Designing an Authentication System: A Dialogue in Four Scenes (1997)
web.mit.eduยท1hยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help