🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🀐 Secure Multiparty

Privacy Computing, Federated Learning, Secret Sharing, Cryptographic Protocols

Federated Learning for Big Data: A Survey on Opportunities, Applications, and Future Directions
arxiv.orgΒ·19h
🧠Machine Learning
The Danish Sugar Beats Auction has a weird role in cryptography history
evervault.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
AI, Antitrust & Privacy: When More Competition Makes Things Worse
nakedcapitalism.comΒ·13h
πŸ”²Cellular Automata
How Does PGP Encryption Workβ€”and Is It Still Secure in 2025?
securityscorecard.comΒ·7h
πŸ”Quantum Security
PrivTuner with Homomorphic Encryption and LoRA: A P3EFT Scheme for Privacy-Preserving Parameter-Efficient Fine-Tuning of AI Foundation Models
arxiv.orgΒ·19h
πŸ”’Privacy Preserving
Exploring Adversarial Attacks on the MaSTer Truncation Protocol
esat.kuleuven.beΒ·1d
πŸ’»Local LLMs
Announcing FOKS, the Federated Open Key Service
blog.foks.pubΒ·9hΒ·
Discuss: Lobsters, Hacker News
🏠Homelab Federation
Proof Complexity 2025
cstheory-events.orgΒ·22h
🎯Performance Proofs
Inside the billion-dollar identity fraud ecosystem
techradar.comΒ·14h
πŸ”—Data Provenance
Encryption and Decryption in Go: A Hands-On Guide
dev.toΒ·5hΒ·
Discuss: DEV
🌊Stream Ciphers
We Need AI Systems That Can Govern Themselves
cacm.acm.orgΒ·4h
⚑Incremental Computation
Superimposed codes, take two
blog.sesse.netΒ·3h
πŸ”’Bitwise Algorithms
The cloud-native imperative for effective cyber resilience
theregister.comΒ·8h
πŸ’ΎPersistence Strategies
Censorship, Surveillance, and the Splinternet: Why We Need a Decentralized Web
hackernoon.comΒ·1d
πŸ–₯️Self-hosted Infrastructure
Distributed Systems for Fun and Profit
book.mixu.netΒ·1dΒ·
Discuss: Hacker News
🌊Streaming Systems
Aim High, Stay Private: Differentially Private Synthetic Data Enables Public Release of Behavioral Health Information with High Utility
arxiv.orgΒ·19h
πŸ”Homomorphic Encryption
Early Signs of Steganographic Capabilities in Frontier LLMs
arxiviq.substack.comΒ·10hΒ·
Discuss: Substack
πŸ’»Local LLMs
The God Protocols | Satoshi Nakamoto Institute
nakamotoinstitute.orgΒ·6d
πŸ”‘Cryptographic Protocols
A Conversation with Val Bercovici about Disaggregated Prefill / Decode
fabricatedknowledge.comΒ·1d
πŸ“ΌTape Combinators
The Free Rider Problem
plato.stanford.eduΒ·2hΒ·
Discuss: Hacker News
πŸ”²Cellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap