🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🀐 Secure Multiparty

Privacy Computing, Federated Learning, Secret Sharing, Cryptographic Protocols

June 2025 Malware Spotlight: Discord Exploits Lead to Rising Threats
blog.checkpoint.comΒ·7h
🦠Malware Analysis
A Conversation with Val Bercovici about Disaggregated Prefill / Decode
fabricatedknowledge.comΒ·2d
πŸ“ΌTape Combinators
The Hyperstitions of Moloch – Latent.Space
latent.spaceΒ·15mΒ·
Discuss: Hacker News
🌍Cultural Algorithms
How to architect a scalable data pipeline for HealthTech applications
datasciencecentral.comΒ·6h
🌊Stream Processing
Privacy Coins: Your 2025 Guide to Anonymous Crypto and Smart Opportunities
thecryptojournal.substack.comΒ·1dΒ·
Discuss: Substack
πŸ”—Hash Chains
Why Your 'Free' Solution Could Cost You $251K
fusionauth.ioΒ·9hΒ·
Discuss: Hacker News
🎫Kerberos History
The State of Post-Quantum Cryptography (PQC) on the Web
f5.comΒ·2dΒ·
Discuss: Hacker News
πŸ”Quantum Security
Open-Source Security Paradox: More Code, More Validation
onekey.soΒ·11hΒ·
Discuss: Hacker News
πŸ”“Open Source Software
Machine Learning Fundamentals: clustering with python
dev.toΒ·2dΒ·
Discuss: DEV
πŸ“ŠVector Quantization
Topic Modeling and Link-Prediction for Material Property Discovery
arxiv.orgΒ·16h
🧭Content Discovery
Towards integration of Privacy Enhancing Technologies in Explainable Artificial Intelligence
arxiv.orgΒ·1d
πŸ›‘οΈDifferential Privacy
We Need AI Systems That Can Govern Themselves
cacm.acm.orgΒ·1d
⚑Incremental Computation
How Blockchain Can Simplify Post-Merger Master Data Management
hackernoon.comΒ·1d
πŸ”—Data Provenance
MCP Deep Dive: the Great, the Broken, and the Downright Dangerous
dev.toΒ·5hΒ·
Discuss: DEV
⚑gRPC
Campaigning through the lens of Google: A large-scale algorithm audit of Google searches in the run-up to the Swiss Federal Elections 2023
arxiv.orgΒ·16h
🎯Retrieval Systems
Who's the Mole? Modeling and Detecting Intention-Hiding Malicious Agents in LLM-Based Multi-Agent Systems
arxiv.orgΒ·1d
🎯Threat Hunting
Controlling What You Share: Assessing Language Model Adherence to Privacy Preferences
arxiv.orgΒ·16h
πŸ’»Local LLMs
BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication
arxiv.orgΒ·1d
πŸ‡ΈπŸ‡ͺNordic Cryptography
Improving AI-Based Canine Heart Disease Diagnosis with Expert-Consensus Auscultation Labeling
arxiv.orgΒ·16h
πŸŽ™οΈWhisper
Archetype-Aware Predictive Autoscaling with Uncertainty Quantification for Serverless Workloads on Kubernetes
arxiv.orgΒ·16h
🌊Streaming Systems
Loading...Loading more...
AboutBlogChangelogRoadmap