🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ Privacy Preserving

Homomorphic Encryption, Differential Privacy, Federated Learning, Secure Computation

Storage advice wanted for my homelab
reddit.comΒ·3hΒ·
Discuss: r/homelab
🏠Homelab Preservation
Quicksilver v2: evolution of a globally distributed key-value store (Part 2)
blog.cloudflare.comΒ·4h
πŸ”„Sync Engine
An engineer’s path from data loss to software preservation
softwareheritage.orgΒ·1d
πŸ”„Archival Workflows
6 Design Principles for Edge Computing Systems
thenewstack.ioΒ·3h
🌐Edge Preservation
What browser fingerprinting tests like Amiunique show, and what they miss
blog.castle.ioΒ·1dΒ·
Discuss: Hacker News
πŸ”“Hacking
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.orgΒ·13h
πŸ•΅οΈVector Smuggling
Remote Code Execution Discovered in XTool AnyScan App: Risks to Phones and Vehicles
nowsecure.comΒ·1dΒ·
Discuss: Hacker News
πŸ’£ZIP Vulnerabilities
The Power of Building from Scratch
towardsdatascience.comΒ·1d
🌍Cultural Algorithms
The Shape of Deceit: Behavioral Consistency and Fragility in Money Laundering Patterns
arxiv.orgΒ·1d
πŸ”—Hash Chains
Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dog
theregister.comΒ·6hΒ·
Discuss: Hacker News
πŸ”Quantum Security
Code Execution Through Email: How I Used Claude to Hack Itself
pynt.ioΒ·11hΒ·
Discuss: Hacker News
πŸ”“Hacking
Over 1 million records from US adoption organization left exposed online
techradar.comΒ·3h
πŸ”“Hacking
The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents
arxiv.orgΒ·2d
🎡Audio ML
Edsger W. Dijkstra on IPW's
cs.utexas.eduΒ·1dΒ·
Discuss: Hacker News
πŸ‡·πŸ‡ΊSoviet Computing
Machine Learning Fundamentals: dimensionality reduction example
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“Vector Dimensionality
The Future of IoT AI in 2025 and Beyond
dev.toΒ·14hΒ·
Discuss: DEV
🌊Stream Processing
Day 4 of Learning System Design: Mastering Consistent Hashing
dev.toΒ·5hΒ·
Discuss: DEV
🌐Distributed Hash
Where Security Begins: 5 Insights from the Intersection of Engineering and Teaching
hackernoon.comΒ·1d
πŸ›‘Cybersecurity
3S-Attack: Spatial, Spectral and Semantic Invisible Backdoor Attack Against DNN Models
arxiv.orgΒ·1d
🌐DNS Security
How Apex Fusion and Well-Typed Are Shaping the Future of Institutional DeFi on Cardano
hackernoon.comΒ·1d
🀝Distributed Consensus
Loading...Loading more...
AboutBlogChangelogRoadmap