Feeds to Scour
SubscribedAll
D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning
arxiv.orgยท1d
๐ŸคSecure Multiparty
Preview
Report Post
Post-Quantum Cryptography on CHERIoT
cheriot.orgยท1dยท
Discuss: Hacker News
๐Ÿ”ฒLattice Cryptography
Preview
Report Post
Unlocking Private AI: The Revolutionary Breakthrough in Diff
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธDifferential Privacy
Preview
Report Post
How private is your VPN?
malwarebytes.comยท1d
๐ŸŒDNS over QUIC
Preview
Report Post
Part 2 | Open Infrastructures: Control
openpreservation.orgยท1d
๐ŸŒEdge Preservation
Preview
Report Post
Privacy-Preserving Active Learning for wildfire evacuation logistics networks with zero-trust governance guarantees
dev.toยท15hยท
Discuss: DEV
๐Ÿ”’Privacy Preserving
Preview
Report Post
Obscura Brings Bulletproofs++ to the Beldex Mainnet for Sustainable Scaling
hackernoon.comยท1d
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Next step, a surveillance state
aardvark.co.nzยท1d
๐ŸŒWARC Forensics
Preview
Report Post
[Podcast] Going dark: Measurement when the Internet hides the detail
blog.apnic.netยท2d
๐Ÿ“กDNS Archaeology
Preview
Report Post
Letโ€™s Encrypt Turns Ten
pxlnv.comยท2d
๐Ÿ”Archive Encryption
Preview
Report Post
Cryptographers Show That AI Protections Will Always Have Holes
quantamagazine.orgยท2d
๐ŸงชBinary Fuzzing
Preview
Report Post
exploits.club Weekly(ish) Newsletter 93 - Old QEMU Bugs, Android Auto Bluetooth PoCs, BeeStation P20, and More
blog.exploits.clubยท1d
๐Ÿ’ฃZIP Vulnerabilities
Preview
Report Post
The Eminence in Shadow: Exploiting Feature Boundary Ambiguity for Robust Backdoor Attacks
arxiv.orgยท1d
๐Ÿ”Vector Forensics
Preview
Report Post
Data Protection & Privacy: The Most Needed Safeguards in Todayโ€™s Digital World
dev.toยท1dยท
Discuss: DEV
๐Ÿ›กCybersecurity
Preview
Report Post
Smashing Security podcast #447: Grok the stalker, the Louvre heist, and Microsoft 365 mayhem
grahamcluley.comยท2d
๐ŸบKerberos Archaeology
Preview
Report Post
Digital Forensics Round-Up, December 10 2025
forensicfocus.comยท2d
๐Ÿ”Audio Forensics
Preview
Report Post
Evaluating GPT-5.2 Thinking: Cryptographic Challenge Case Study
irregular.comยท1dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Preview
Report Post
Confidential Observability on Kubernetes: Protecting Telemetry End-to-End- Jitendra Singh, Microsoft
youtube.comยท3d
๐ŸŒŠStreaming Systems
Preview
Report Post
10 Hacks for Online Privacy That Everyone Should Know
lifehacker.comยท2d
๐Ÿ Personal Archives
Preview
Report Post