🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ•΅οΈ Steganography

Hidden Data, Audio Watermarking, Image Embedding, Covert Channels

Label Maker | Better Default Code (Edit friendly)
hackster.ioΒ·15h
πŸ”§KAITAI
[$] Libxml2's "no security embargoes" policy
lwn.netΒ·1d
πŸ”“Free and open source
Participate in the Digital Preservation Bake Off (Tools Demonstration) at iPRES 2025
dpconline.orgΒ·9h
πŸ“„Document Digitization
Worth Reading 062425
rule11.techΒ·1d
🌐DNS over QUIC
Proton’s new YouTube channel aims to arm you with information
proton.meΒ·8m
πŸ•΅οΈVector Smuggling
Show HN: A free tool to extract audio from video
extractaudio.proΒ·1dΒ·
Discuss: Hacker News
🎧FLAC Encoding
Computer-vision research powers surveillance technology
nature.comΒ·1dΒ·
Discuss: Hacker News
πŸ”ŽOSINT Techniques
Golang and Let's Encrypt: a free software story
dotat.atΒ·15hΒ·
Discuss: Hacker News
🌳Archive Merkle Trees
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.comΒ·1dΒ·
Discuss: Hacker News
πŸ“‹DFDL
Floating-Point Data Transformation for Lossless Compression
arxiv.orgΒ·2d
🌊Streaming Compression
DRIFT: Data Reduction via Informative Feature Transformation- Generalization Begins Before Deep Learning starts
arxiv.orgΒ·1d
🧠Machine Learning
Breaking Spatial Boundaries: Spectral-Domain Registration Guided Hyperspectral and Multispectral Blind Fusion
arxiv.orgΒ·13h
πŸŒ€Differential Geometry
Biomed-Enriched: A Biomedical Dataset Enriched with LLMs for Pretraining and Extracting Rare and Hidden Content
arxiv.orgΒ·13h
πŸ”Information Retrieval
Compbolt: A lib with a hard to misuse API (based on Matt Godbolt)
github.comΒ·1dΒ·
Discuss: Hacker News
πŸŒ€Brotli Internals
Russia-linked APT28 use Signal chats to target Ukraine official with malware
securityaffairs.comΒ·2d
πŸ•΅οΈVector Smuggling
And Now Malware That Tells AI to Ignore It?
darkreading.comΒ·19h
πŸ”“Hacking
Thousands of private camera feeds found online. Make sure yours isn’t one of them
malwarebytes.comΒ·1d
πŸ”“Hacking
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.orgΒ·13h
πŸ“ƒManuscript Tokenization
Stop Words Using Spacy - NLP
dev.toΒ·2dΒ·
Discuss: DEV
πŸ“Text Parsing
How to (Almost) solve cybersecurity once and for all
adaptive.liveΒ·1dΒ·
Discuss: Hacker News
πŸ”Systems Hardening
Loading...Loading more...
AboutBlogChangelogRoadmap