Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🆔 Decentralized Identity (DID)
verifiable credentials, self-sovereign identity
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
9212
posts in
11.4
ms
Stop
Managing
Users
Manually
: Building a Single Source of Truth with Next.js.
dev-to-uploads.s3.amazonaws.com
·
5h
·
Discuss:
DEV
🔒
Digital Privacy
Who Actually
Owns
Your
ATProto
Identity? Hint: It's Probably Not You
kevinak.se
·
3d
·
Discuss:
Hacker News
🏠
Self-Hosting
Security
Principles
dev.to
·
1d
·
Discuss:
DEV
🔒
Security
The “
Ego
Credential
” Bit
mobileturdfactory.substack.com
·
14h
·
Discuss:
Substack
🏠
Self-Hosting
Encrypted Client Hello: Closing the
SNI
Metadata
Gap
cdt.org
·
14h
·
Discuss:
Lobsters
🔒
Digital Privacy
Roboflow
(YC
S20
) Is Hiring a Security Engineer for AI Infra
roboflow.com
·
16h
·
Discuss:
Hacker News
⚡
AI-Driven DevOps
Zero-Trust Architecture in
Practice
: Real-World
Implementation
Steps
dev.to
·
23h
·
Discuss:
DEV
🔒
Security
Age
Signaling
and Interface Documentation and Design for
Kicksecure
kicksecure.com
·
1d
·
Discuss:
Hacker News
🔐
Hardware Security
Certified
prime numbers as identity tokens for AI
bots
numinals.io
·
1d
·
Discuss:
Hacker News
💸
Affordable LLMs
Cardsharing
Protocol Deep Dive: Understanding
DVB
Decryption and Network Key Distribution
cardsharing.site
·
8h
·
Discuss:
DEV
🔓
DRM Analysis
Privacy Pass
privacypass.github.io
·
20h
·
Discuss:
Hacker News
🔒
Digital Privacy
Why Pet
Marketplaces
Fail Without Verification
Frameworks
nekomusubi.example.com
·
4h
·
Discuss:
DEV
🏗
Budget Infrastructure
Thinklanceai/humanroot
: Delegation Root Certificate for Autonomous Agents — cryptographic proof that every agent action traces back to a human decision.
github.com
·
1d
·
Discuss:
Hacker News
🔄
Autonomous Agents
I'm struggling to think of any online services for which I'd be
willing
to
verify
my identity or age
neilzone.co.uk
·
1d
·
Discuss:
Lobsters
,
Hacker News
🔒
Digital Privacy
Building Trust Infrastructure for the Agentic Economy: A Response to
Stripe
's Five
Levels
mnemom.ai
·
1d
·
Discuss:
DEV
🔄
Autonomous Agents
The Economics of
Residential
Proxies
: How a "Free" Flashlight App Becomes a $10/GB Node
proxyon.io
·
15h
·
Discuss:
DEV
🔒
Digital Privacy
Zed
will
require
age identification for its services
zed.dev
·
1d
·
Discuss:
Hacker News
,
Hacker News
🔒
Digital Privacy
Wambita/Binder
: Binder, a binary binder is an educational cybersecurity tool designed to explore the mechanics of file structures, process
spawning
, and binary manipulation on Linux systems. It demonstrates how multiple independent programs can be bundled into a single executable "wrapper" and extracted during runtime.
github.com
·
11h
·
Discuss:
DEV
🔬
Reverse Engineering
LLMs can
unmask
pseudonymous
users at scale with surprising accuracy
arstechnica.com
·
1d
·
Discuss:
Hacker News
,
Hacker News
,
r/artificial
,
r/technews
🦙
Ollama
Hardware-Backed
Developer
Credentials
vouch.sh
·
2d
·
Discuss:
Hacker News
🔐
Hardware Security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help