Feeds to Scour
SubscribedAll
Scoured 15546 posts in 676.7 ms
RISC-V and Post-Quantum Cryptography
fprox.substack.comΒ·1dΒ·
Discuss: Substack
πŸ”Quantum Security
Preview
Report Post
Sweden’s intelligence service makes arrest over threats β€” won't say if ministers were targets
sverigesradio.seΒ·21h
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
Preview
Report Post
European digital identity: A missed opportunity?
arxiv.orgΒ·3h
πŸ”PKI Archaeology
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.comΒ·20h
πŸ“ŠStatic Analysis
Preview
Report Post
Defence in Depth in Python Security: Why Using Multiple SAST Tools Matters
nocomplexity.comΒ·16h
πŸ”’WASM Capabilities
Preview
Report Post
Attackers are getting stealthier – how can defenders stay ahead?
techradar.com
Β·17h
🎯Threat Hunting
Preview
Report Post
(Swedish) Pension Asset Manager Alecta has sold off an estimated 80 billion kronor (7,5b EUR) of US Treasury Bonds
di.se
Β·21hΒ·
βš™οΈSwedish Assembly
Preview
Report Post
Alice and Bob in Wonderland - Identity and authority without servers (2024)
herbcaudill.comΒ·1dΒ·
Discuss: Hacker News
πŸ”PKI Archaeology
Preview
Report Post
Efficient Privacy-Preserving Retrieval Augmented Generation with Distance-Preserving Encryption
arxiv.orgΒ·1d
πŸ”Homomorphic Encryption
Preview
Report Post
Privacy-Preserving Active Learning for heritage language revitalization programs with zero-trust governance guarantees
dev.toΒ·22hΒ·
Discuss: DEV
πŸ’»Local LLMs
Preview
Report Post
Secret Management with SOPS
unixorn.github.ioΒ·2d
πŸ”Archive Encryption
Preview
Report Post
Values of the world, unite!
jemarch.netΒ·1d
πŸ”§Binary Parsers
Preview
Report Post
Ny bok – ”Psychological Defence and Information Influence”
carlheath.seΒ·3d
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
Preview
Report Post
How to identify yourself, when yourself changes? Neal Stephenson's PURDAH.
prepend.comΒ·1d
πŸ”“Hacking
Preview
Report Post
Nukeproof: Manifesto for European Data Sovereignty
nukeproof.orgΒ·20hΒ·
Discuss: Hacker News
🏷️Metadata Standards
Preview
Report Post
Old habits die hard: 2025’s most common passwords were as predictable as ever
welivesecurity.comΒ·1d
πŸ”“Password Cracking
Preview
Report Post
UK's NCSC warns of Russian-aligned hacktivist groups
metacurity.comΒ·1d
πŸ”“Hacking
Preview
Report Post
Quantum cryptography beyond key distribution: Theory and experiment
link.aps.orgΒ·1d
πŸ”Quantum Cryptography
Preview
Report Post
What is OSINT?
medium.comΒ·1d
πŸ”ŽOSINT Techniques
Preview
Report Post
SLSA: Safeguarding artifact integrity across any software supply chain
sam.roque-worcel.comΒ·1dΒ·
Discuss: Hacker News
πŸ”—Supply Chain
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help