Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Digital Privacy
Encryption, Self-hosted Services, Data Sovereignty, P2P Networks
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186618
posts in
31.8
ms
NymVPN
: The world's most private
decentralized
VPN
🌐
Network Security
nym.com
·
6d
The
balance
between privacy and
oversharing
🔒
Differential Privacy
puppynet.work
·
1d
Data is a sovereignty issue. And
broader
than just the
hyperscalers
☁️
Cloud Computing
computerweekly.com
·
13h
Utah
’s New Law Targeting
VPNs
Goes Into Effect Next Week
🛡️
Content Security Policy
eff.org
·
1h
·
Hacker News
Training Machine Learning Models on
Encrypted
Data: A Privacy-Preserving Framework using
Homomorphic
Encryption
🔒
Differential Privacy
arxiv.org
·
2d
Privacy on Rails
Pragmatically
complying
with data protection laws
🔒
Security
blog.codeminer42.com
·
8h
GnuVPN
and the Rise of Alternative
VPNs
Focused on Privacy and Flexibility
🌐
Network Security
digitaltrends.com
·
3d
The Making of Digital
Identity
- 06 - The Mobile Revolution and the
Surveillance
Machine
🆔
Decentralized Identity (DID)
syntheticauth.ai
·
2d
·
Hacker News
,
r/programming
I hope you're not paying for worse security or the
VPN
Myth
🌐
Network Security
imdanielkendall.com
·
1d
The Real Problem With Digital Privacy Isn’t Security. It’s
Fragmentation
🔒
Differential Privacy
ciforus.medium.com
·
3d
The
Commodification
of
Sensitive
Open Data
🎭
Privacy Engineering
katinamagazine.org
·
3d
Data Protection on AWS: Building an End-to-End Encryption Strategy for S3,
RDS
, and
Lambda
🔓
DRM Analysis
medium.com
·
3d
Privacy-first mind
mapping
app. Part 3:
Encryption
Model
🔐
Hardware Security
mindmapvault.com
·
6d
·
DEV
From
Rerandtopia
to
Interceptopia
, the Anamorphic Encryption Saga Rises
🔓
DRM Analysis
eprint.iacr.org
·
5d
PRAG
End-to-End
Privacy-Preserving
Retrieval-Augmented Generation
🔍
RAG
arxiv.org
·
21h
shadowbipnode/sovereign-linux-tools
: Practical guides for sovereign, private, and self-hosted Linux
setups
. Encryption, node operation, key management, network hardening.
🐧
Linux
github.com
·
4d
Red Hat's
Stratis
Storage 3.9 Released With Online
Encryption/Decryption/Reencryption
📦
Personal Archiving
phoronix.com
·
3d
·
r/linux
Encrypting
Encrypted Traffic To Get Around
VPN
Bans
🌐
Network Security
hackaday.com
·
6d
·
Hacker News
Email Privacy Shield: Zero Direct Mail and No Cross-Site
Correlation
via Email
Aliases
🆔
Decentralized Identity (DID)
emparrot.com
·
4d
·
DEV
The Supreme Court’s
geofence
warrant
case could reshape digital privacy
🎭
Privacy Engineering
fastcompany.com
·
3d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help