Feeds to Scour
SubscribedAll
Scoured 13832 posts in 483.2 ms
Federated Learning with PySyft: Enabling Private and Efficie
dev.toยท1dยท
Discuss: DEV
๐ŸคSecure Multiparty
Preview
Report Post
Building Privacy Preserving RAG with Homomorphic Encryption
subhashdasyam.comยท6dยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
Preview
Report Post
Beyond the Device: Exploring the New Security Risks of Interconnected IoT at CES 2026
rapid7.comยท1d
๐Ÿ Home Automation
Preview
Report Post
Privacy at Scale in Networked Healthcare
arxiv.orgยท2d
๐Ÿ”’Privacy Archives
Preview
Report Post
Balancing AI Innovation with Data Privacy: A Strategic Approach
info.aiim.orgยท2d
๐Ÿ”Vector Forensics
Preview
Report Post
Vulnerabilities in the Cashu ECash Protocol
conduition.ioยท1d
๐Ÿ”—Hash Chains
Preview
Report Post
Reversible Computation as a software construction paradigm
news.ycombinator.comยท1hยท
Discuss: Hacker News
โšกIncremental Computation
Preview
Report Post
WTF is Privacy-Preserving Machine Learning?
dev.toยท3dยท
Discuss: DEV
๐Ÿ”’Privacy Archives
Preview
Report Post
Computational Depth
blog.computationalcomplexity.orgยท1dยท
๐ŸงฎKolmogorov Complexity
Preview
Report Post
Ogg Encapsulation for the Opus Audio Codec
rfc-editor.orgยท8h
โœ…FLAC Verification
Preview
Report Post
Credential stuffing: What it is and how to protect yourself
welivesecurity.comยท2d
๐ŸŽฏNTLM Attacks
Preview
Report Post
Federated Learning, Part 1: The Basics of Training Models Where the Dataย Lives
towardsdatascience.comยท16h
๐ŸคSecure Multiparty
Preview
Report Post
Better Compression with Zstandard
gregoryszorc.comยท1h
โšกModern Compression
Preview
Report Post
Sub Rosa โ€“ An open-source, end-to-end secret sharing tool
sub-rosa.devยท15hยท
Discuss: Hacker News
๐Ÿ”Swedish Cryptography
Preview
Report Post
Warp Specialization in Triton: Design and Roadmap
pytorch.orgยท13hยท
Discuss: Hacker News
โšกCache Coherence
Preview
Report Post
Golomb-Rice coding for compressing a set of hashes
johndcook.comยท1d
๐Ÿ“ŠCompression Proofs
Preview
Report Post
Identity & Beyond: 2026 Incident Response Predictions
cybereason.comยท1d
๐ŸŽฏThreat Hunting
Preview
Report Post
Using Keybase and PGP to Build Certificate Trust Chains
blog.certisfy.comยท15hยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
Preview
Report Post
The Dirty Secret of Million-Token Context Windows
deadneurons.substack.comยท17hยท
Discuss: Substack
๐ŸŒ€Brotli Internals
Preview
Report Post
Sparse Federated Representation Learning for heritage language revitalization programs with inverse simulation verification
dev.toยท9hยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help