Operationalizing Data Minimization for Privacy-Preserving LLM Prompting
arxiv.orgยท11h
๐Ÿ’ปLocal LLMs
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท3h
๐Ÿ”ขReed-Solomon Math
Troops and veteransโ€™ personal information leaked in CPAP Medical data breach
malwarebytes.comยท4h
๐Ÿ”“Hacking
Privacy-First AI Apps: Whatโ€™s Next? ๐Ÿ”’
dev.toยท8hยท
Discuss: DEV
๐Ÿ”’Privacy Archives
Triple Threat: Signal's Ratchet Goes Post-Quantum
blog.quarkslab.comยท17h
๐Ÿ”Quantum Security
Donโ€™t Let Your Cloud Security Catch a Bad Case of Permission Creep
tenable.comยท2h
๐Ÿ”Capability Security
Uncovering diverse water adsorption characteristics in metalโ€“organic frameworks
phys.orgยท47m
๐ŸŒก๏ธPreservation Physics
Algorithmic Archive Project: Use Cases (1/3)
blogs.bodleian.ox.ac.ukยท5h
๐Ÿ“ŠCitation Graphs
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Moeve: Controlling resource deployment at scale with AWS CloudFormation Guard Hooks
aws.amazon.comยท4h
๐Ÿ•ธ๏ธMesh Archiving
Quantum capacity amplification via privacy
arxiv.orgยท11h
โš›๏ธQuantum Compression
Customizable AI systems that anyone can adapt bring big opportunities โ€” and even bigger risks
nature.comยท5h
๐Ÿ”“Hacking
Free online password generator โ€“ simple, customizable, and privacy-conscious
pasgen.onlineยท7hยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
The ReD Hat Consulting Breach โ€“ An Analysis
digitalforensicsmagazine.comยท6h
๐Ÿ”“Hacking
Toy Binary Decision Diagrams
philipzucker.comยท1d
๐ŸงฎAlgebraic Datatypes
ObCLIP: Oblivious CLoud-Device Hybrid Image Generation with Privacy Preservation
arxiv.orgยท11h
๐Ÿ”Homomorphic Encryption
Potential EU law sparks global concerns over end-to-end encryption for messaging apps
cyberscoop.comยท21h
๐Ÿ”คEBCDIC Privacy
How to eliminate digital friction to keep AI innovation on track
techradar.comยท1h
๐ŸŒŠStreaming Systems
LLM Data Detox: Erasing the Past for a Brighter AI Future
dev.toยท1hยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
How To Build Effective Technical Guardrails for AI Applications
towardsdatascience.comยท21h
๐Ÿ”—Constraint Handling