🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ Privacy Archives

Homomorphic Encryption, Federated Learning, Secure Computation, Confidential Storage

When Secure Aggregation Falls Short: Achieving Long-Term Privacy in Asynchronous Federated Learning for LEO Satellite Networks
arxiv.orgΒ·1d
🀐Secure Multiparty
Show HN: SecretMemoryLocker – Q&A-Style Archive for Your Digital Life
secretmemorylocker.comΒ·19hΒ·
Discuss: Hacker News
πŸ”Archive Encryption
Live and Let Die: Rethinking Personal Digital Archiving, Memory, and Forgetting Through a Library Lens
lil.law.harvard.eduΒ·1d
🧲Magnetic Philosophy
Unsupervised Learning NO. 494
newsletter.danielmiessler.comΒ·1d
πŸ“ŠFeed Optimization
Is a new privacy protocol helping malicious actors more than Internet users?
techradar.comΒ·15h
πŸ”Homomorphic Encryption
Imperfect light sources achieve new benchmark in secure quantum communication
phys.orgΒ·4h
πŸ”Quantum Cryptography
How Architectural Controls Help Can Fill the AI Security Gap
darkreading.comΒ·5h
πŸ”’Language-based security
UK Backs Down On Apple Encryption Backdoorβ€”But The Secret Deal Raises New Questions
techdirt.comΒ·3h
πŸ”“Hacking
Sapir-Whorf does not apply to Programming Languages
buttondown.comΒ·11h
πŸ’»Programming languages
AI Tools Now Use Radar to Wiretap Your Phone from 10 Feet Away
offthegridnews.comΒ·1dΒ·
Discuss: Hacker News
πŸ‘‚Audio Evidence
From the Top to the Bottom; Tracking down CVE-2017-7149
objective-see.comΒ·3h
πŸ”“Hacking
Intelligence Insights: August 2025
redcanary.comΒ·7h
πŸ“‘Feed Security
Activate Me!: Designing Efficient Activation Functions for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption
arxiv.orgΒ·3d
πŸ”Homomorphic Encryption
Introduction to Bluesky's AT Protocol
mackuba.euΒ·1dΒ·
Discuss: Hacker News
πŸ”ŒInterface Evolution
Show HN: Changefly ID + Anonymized Identity and Age Verification
changefly.comΒ·4hΒ·
Discuss: Hacker News
πŸš€Indie Hacking
The Future of Database Activity Monitoring Is Here
optiv.comΒ·4h
πŸ—„οΈDatabase Internals
Digital Forensics Round-Up, August 20 2025
forensicfocus.comΒ·1d
πŸ“ŸTerminal Forensics
Building a Distributed Filesystem for Scalable Research
hudsonrivertrading.comΒ·1dΒ·
Discuss: Hacker News
πŸ—„οΈFile Systems
The ABCs of β€œβ€‘ishing”: From Phishing to Quishing
bitsight.comΒ·4h
🎯Threat Hunting
AI Analyzed My Health Data and Uncovered How I Threw My Back Out
akhurana.substack.comΒ·6hΒ·
Discuss: Substack
πŸ”ŒOffline-first Apps
Loading...Loading more...
AboutBlogChangelogRoadmap