๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ DRM Analysis
Content protection systems, obfuscation techniques, protocol analysis
Filter Results
Timeframe
Hot
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
4622
posts in
72.5
ms
Introducing the XLab AI Security Guide
lesswrong.com
ยท
11h
๐ก๏ธ
AI Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Security news weekly round-up
dev.to
ยท
1d
ยท
Discuss:
DEV
๐
Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Bluetooth Headphone Jacking: Full Disclosure of Airoha RACE Vulnerabilities
insinuator.net
ยท
4h
ยท
Discuss:
Hacker News
๐
Hardware Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
[Discussion] The "Noise" Bottleneck in Local 8B RAG โ A comparison of cleaning strategies (Regex vs. Unstructured vs. Entropy)
reddit.com
ยท
9h
ยท
Discuss:
r/LocalLLaMA
๐ธ
Bloom Filters
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Tackling Unmaintainable Complexity with Automation: Building a Multi-Tenant SaaS Solo
ko-chan.github.io
ยท
12h
ยท
Discuss:
DEV
๐
Infrastructure as Code (IaC)
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
On Evaluating Adversarial Robustness
paperium.net
ยท
1h
ยท
Discuss:
DEV
๐ก๏ธ
AI Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Zen-GC โ policy-driven K8s garbage collection for automated cleanup
github.com
ยท
11h
ยท
Discuss:
Hacker News
๐
Infrastructure as Code (IaC)
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Tangible Media: A Historical Collection of Information Storage Technology
tangiblemediacollection.com
ยท
19h
ยท
Discuss:
Hacker News
๐พ
Digital Archiving
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Cleartext Signatures Considered Harmful
gnupg.org
ยท
9h
ยท
Discuss:
Hacker News
๐ค
Text Processing
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
IPC in Rust
3tilley.github.io
ยท
1d
๐ต
Go
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
39C3: To sign or not to sign: Practical vulnerabilities in GPG & friends
media.ccc.de
ยท
5h
ยท
Discuss:
Lobsters
,
Hacker News
๐
Hardware Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Building the World's First Cryptographic Audit Trail for MetaTrader: A Deep Technical Dive
dev.to
ยท
20h
ยท
Discuss:
DEV
๐ฌ
Prompt Engineering
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Summary of the USA federal government's zero-trust memo
bastionzero.com
ยท
15h
ยท
Discuss:
Hacker News
๐
Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Everything Is a Number
francescocarlucci.com
ยท
1d
ยท
Discuss:
Hacker News
๐ต
Digital Minimalism
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Show HN: BrandRetina โ screenshot similarity API for spear-phish detection
brandretina.ai
ยท
1d
ยท
Discuss:
Hacker News
โฟ
Accessibility Testing
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Cybersecurity ProxyChains: A Mask of Anonymity
dev.to
ยท
10h
ยท
Discuss:
DEV
๐
Digital Privacy
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core (CVE-2025-68664)
cyata.ai
ยท
2d
ยท
Discuss:
Hacker News
๐ฆ
Dependency Confusion
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Jailbreaks Peak Early, Then Drop: Layer Trajectories in Llama-3.1-70B
lesswrong.com
ยท
15h
๐
Hardware Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Bypass Windows user interface privilege isolation via the CTF input method proto
projectzero.google
ยท
1d
ยท
Discuss:
Hacker News
๐
Terminal Multiplexers
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Differentially Private Federated Learning: A Client Level Perspective
paperium.net
ยท
1d
ยท
Discuss:
DEV
๐
Differential Privacy
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Loading...
Loading more...
Page 2 »