🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🤐 Secure Multiparty

Privacy Computing, Federated Learning, Secret Sharing, Cryptographic Protocols

Safer cold storage on Ethereum
blog.trailofbits.com·1d
🔗Hash Chains
The quantum computing race is moving beyond hardware to focus on software
techspot.com·1d
⚛️Quantum Compilers
OpenAI widely thought to be Broadcom's mystery $10 billion custom AI processor customer — order could be for millions of AI processors
tomshardware.com·18h
🖥️Modern Terminals
Let's make PostgreSQL multi-threaded (2023)
postgresql.org·2d·
Discuss: Hacker News
🗄️PostgreSQL WAL
From Fine-Tuning to Production: A Scalable Embedding Pipeline with Dataflow
developers.googleblog.com·1d
⚙️Batch Processing
Clingy chatbots, AI recruiters and other new research findings
restofworld.org·1d·
Discuss: Hacker News
🤖AI Curation
EvolutionAPI/evolution-api
github.com·14h
🔌Interface Evolution
Just One More Prompt
commandpattern.org·1d·
Discuss: Hacker News
⚡Proof Automation
Shared Ownership Is for Suckers
segfaulte.substack.com·3d·
Discuss: Substack
🏠Homelab Federation
X is now offering me end-to-end encrypted chat. You probably shouldn’t trust it yet.
techcrunch.com·1d
🌊Stream Ciphers
Is Noisy Data a Blessing in Disguise? A Distributionally Robust Optimization Perspective
arxiv.org·3d
🎯Performance Proofs
The evolution of trust as a cognitive shortcut in repeated interactions
arxiv.org·1d
🔲Cellular Automata
EverTracer: Hunting Stolen Large Language Models via Stealthy and Robust Probabilistic Fingerprint
arxiv.org·2d
💻Local LLMs
Unlock Network Insights: AI-Powered Observability on a Shoestring by Arvind Sundararajan
dev.to·2d·
Discuss: DEV
📡Network Monitoring
CloudFormer: An Attention-based Performance Prediction for Public Clouds with Unknown Workload
arxiv.org·2d
👁️Observatory Systems
Why Responsible AI Governance Matters: Insights from Ismaila Whittier
dev.to·1d·
Discuss: DEV
⚖️Emulation Ethics
Diffusion-RL Based Air Traffic Conflict Detection and Resolution Method
arxiv.org·1d
🔲Cellular Automata
Detecting Rug Pulls in Decentralized Exchanges: Machine Learning Evidence from the TON Blockchain
arxiv.org·3d
🔗Hash Chains
VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities
arxiv.org·2d
🧪CBOR Fuzzing
AI's Great Escape: Goal-Driven Exploration of Simulated Universes
dev.to·12h·
Discuss: DEV
🔲Cellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap