Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
4921
posts in
66.9
ms
Practical Strategies for
Securing
Web
APIs
in Modern Applications
dev.to
·
21h
·
Discuss:
DEV
🔗
API Integration
E2EE
Backend part 1:
Homomorphic
Encryption
peterspath.net
·
15h
·
Discuss:
Hacker News
🔒
Digital Privacy
Securing
GenAI
: Vol 4 — Fundamentals of AI model security
pub.towardsai.net
·
4h
🛡️
AI Security
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
·
11h
·
Discuss:
Hacker News
🛡
Vulnerability Management
Strengthening
Windows trust and security through User Transparency and
Consent
blogs.windows.com
·
11h
·
Discuss:
Hacker News
🔐
Hardware Security
The
barrier
to identity theft is
crumbling
s-jac.github.io
·
10h
·
Discuss:
Hacker News
🆔
Decentralized Identity (DID)
Signing JSON Web
Tokens
: Algorithm
Tradeoffs
, Performance, and Security
ciamweekly.substack.com
·
18h
·
Discuss:
Substack
🔓
DRM Analysis
Your Browser's
Extensions
May Be Reading Your
Passwords
lifehacker.com
·
11h
🛡️
Content Security Policy
Everything I know about good system design
seangoedecke.com
·
7h
🗄️
Databases
A
one-prompt
attack that breaks LLM safety
alignment
microsoft.com
·
15h
·
Discuss:
Hacker News
💬
Prompt Engineering
Why I Spent 5 Hours Finding a 20-Minute Fix: A Case for
Structured
Logging
nandishdave.world
·
1h
·
Discuss:
DEV
🔧
Code Refactoring Patterns
eBPF
Gives You
Packets
. Here's How We Turn Them Into Security Insights
akashmandal001.substack.com
·
1d
·
Discuss:
Substack
🔓
DRM Analysis
hanig/engram
: Personal knowledge graph and automation system
github.com
·
2d
💬
Prompt Engineering
Show HN: Applying
OAuth/RBAC
patterns to secure AI agents
macawsecurity.ai
·
15h
·
Discuss:
Hacker News
🛡️
AI Security
Main
Content ||
Math
∩ Programming
jeremykun.com
·
1d
📊
Algorithms
Insecurity
of Quantum Secure
Computations
paperium.net
·
12h
·
Discuss:
DEV
🔒
Digital Privacy
IAM
Security
Audit
tolubanji.com
·
2d
·
Discuss:
DEV
🔓
DRM Analysis
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
2d
·
Discuss:
Hacker News
🔓
DRM Analysis
Roll with Advantage:
Hacking
Lenovo
Vantage
mkiesel.ch
·
21h
·
Discuss:
Hacker News
🔐
Hardware Security
Building a Secure Email Migration Tool:
OAuth
,
Encryption
, and Privacy by Design
dev.to
·
21h
·
Discuss:
DEV
🔒
Digital Privacy
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help