🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🤐 Secure Multiparty

Privacy Computing, Federated Learning, Secret Sharing, Cryptographic Protocols

Aligning IT and security teams for optimal business success
techradar.com·1d
🔐Capability Systems
Prioritized Software and Services List + MITRE Tactics Part VI
optiv.com·20h
🏠Homelab Security
Identity-First Security: Mitigating the Cloud’s Greatest Risk Vector
tenable.com·1d
🔐Capability Security
ML Systems: Motivating Dense Models
jacobkahn.me·1d·
Discuss: Hacker News
🧠Machine Learning
Hybrid AI-Driven Intrusion Detection: Framework Leveraging Novel Feature Selection for Enhanced Network Security
arxiv.org·2d
🎯Threat Hunting
AI Watermarks: Guarding Your Million-Dollar Machines Against Data Hijackers
dev.to·2d·
Discuss: DEV
🕵️Vector Smuggling
Real-Time Gas Mixture Discrimination Using Bayesian Compressed Sensing & Hyperdimensional Encoding
dev.to·6h·
Discuss: DEV
🌀Differential Geometry
Architecting UltraNews: Building a Real-Time News Intelligence Platform That Scales
dev.to·11h·
Discuss: DEV
🌊Stream Processing
Managing Correlations in Data and Privacy Demand
arxiv.org·1d
🛡️Differential Privacy
Too Noisy to Collude? Algorithmic Collusion Under Laplacian Noise
arxiv.org·1d
🤝Consensus Algorithms
ActivityPub message rewrite facility (MRF) based on WASM
aumetra.xyz·10h·
Discuss: Hacker News
🔒WASM Capabilities
Cut Costs, Not Accuracy: LLM-Powered Data Processing with Guarantees
arxiv.org·1d
💻Local LLMs
Show HN: No More Vendor Lock-In: Our Open-Source Protocol for AI Portability
github.com·1d·
Discuss: Hacker News
🔌Interface Evolution
Civics Is Boring. So, Let's Encrypt Something
queue.acm.org·2d·
Discuss: Hacker News
🔒Language-based security
MCP OAuth 2.1 - A Complete Guide
dev.to·1d·
Discuss: DEV
🔐PAKE Protocols
On the MIA Vulnerability Gap Between Private GANs and Diffusion Models
arxiv.org·1d
💻Local LLMs
Fort Knox for Factories: AI-Powered Watermarks for Industrial Control Code by Arvind Sundararajan
dev.to·2d·
Discuss: DEV
🔍Vector Forensics
The Angels and Demons of Nondeterminism
buttondown.com·1d·
Discuss: Hacker News
💻Programming languages
Warming Up for Zeroth-Order Federated Pre-Training with Low Resource Clients
arxiv.org·1d
📊Quantization
Preference Robustness for DPO with Applications to Public Health
arxiv.org·1d
🧮Kolmogorov Bounds
Loading...Loading more...
AboutBlogChangelogRoadmap