๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ Vector Smuggling

Embedding Exfiltration, Covert Channels, Data Hiding, ML Security

Get Back To WARP
binary.ninjaยท2d
๐ŸงชBinary Fuzzing
DeepSeek launches v3.1 model, raising the stakes in the US-China AI race
techspot.comยท1d
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
America's Secretive X-37B Space Plane Will Test a Quantum Alternative to GPS for the US Space Force
science.slashdot.orgยท6h
โš›๏ธQuantum Tape
What the โ€˜Panama Playlistsโ€™ Exposed About Spotify User Privacy
nytimes.comยท14hยท
Discuss: Hacker News
๐Ÿ’ฟFLAC Archaeology
Internet Access Providers Aren't Bound by DMCA Unmasking Subpoenasโ€“In Re Cox
blog.ericgoldman.orgยท4hยท
Discuss: Hacker News
๐Ÿดโ€โ˜ ๏ธPiracy
Coris (YC S22) Is Hiring
ycombinator.comยท4dยท
Discuss: Hacker News
๐Ÿ Homelab Pentesting
Rust for JavaScript Engineers โ€“ Intro
afloat.boatsยท18hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Amid Service Disruption, Colt Telecom Confirms 'Criminal Group' Accessed Their Data, As Ransomware Gang Threatens to Sell It
it.slashdot.orgยท1d
๐Ÿ”—Data Provenance
I Hacked Monster Energy and You Won't Believe What They Think You Look Like
bobdahacker.comยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ”“Hacking
What Hugging Face reveals about the data economy of fine-tuning
research.portexai.comยท2dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Predictive Maritime Asset Valuation via Dynamic Network Embedding & Bayesian Optimization
dev.toยท2dยท
Discuss: DEV
๐Ÿ”Vector Forensics
Some recent project milestones
markjgsmith.comยท4h
๐Ÿ”ŒInterface Evolution
MPOCryptoML: Multi-Pattern based Off-Chain Crypto Money Laundering Detection
arxiv.orgยท5d
๐Ÿ”—Hash Chains
Locally Differentially Private Multi-Sensor Fusion Estimation With System Intrinsic Randomness
arxiv.orgยท2d
๐Ÿ›ก๏ธDifferential Privacy
๐๐ž๐ฒ๐จ๐ง๐ ๐…๐ซ๐ž๐ฌ๐ก๐ง๐ž๐ฌ๐ฌ: ๐‡๐จ๐ฐ ๐ญ๐จ ๐ฎ๐ฌ๐ž ๐’๐ž๐š๐ซ๐œ๐ก ๐Œ๐จ๐๐ž๐ฌ ๐ข๐ง ๐•๐ž๐œ๐ญ๐จ๐ซ ๐ƒ๐š๐ญ๐š๐›๐š๐ฌ๐ž๐ฌ (๐ฐ๐ข๐ญ๐ก ๐‹๐š๐ง๐ ๐œ๐ก๐š๐ข๐ง)
dev.toยท20hยท
Discuss: DEV
๐Ÿ—‚๏ธVector Search
FBI: Russia-linked group Static Tundra exploit old Cisco flaw for espionage
securityaffairs.comยท3d
๐Ÿ”“Hacking
Adaptive Resonance Field Optimization for Sentiment-Driven Autonomous Systems
dev.toยท17hยท
Discuss: DEV
๐ŸŽ›๏ธFeed Filtering
What is Backpropagation?
dev.toยท21hยท
Discuss: DEV
๐Ÿง Machine Learning
Launch HN: BlankBio (YC S25) โ€“ Making RNA Programmable
news.ycombinator.comยท2dยท
Discuss: Hacker News
โšกIncremental Computation
AGI Is an Engineering Problem
vincirufus.comยท23hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap