Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🪪 Digital Identity
digital identity, diatf, dvs register, trust framework
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187396
posts in
23.3
ms
Germany's
Sovereign
Tech Agency launches
Sovereign
Tech
Standards
to support open
standards
✅
Compliance
gamingonlinux.com
·
18h
Guess
its time to setup
OPNsense
....
🔏
Privacy
fing.com
·
2h
·
r/homelab
Asiadav/OpenPBKDF2
: An open-source ASIC implementation of the PBKDF2 algorithm using SHA256 encryption
✅
Compliance
github.com
·
3h
Learn more about digital IDs in Google Wallet → https://
goo.gle/4txvYVX
🔏
Privacy
twitter.macworks.dev
·
2d
Verify
your
identity
✅
Compliance
forums.androidcentral.com
·
8h
Why
Identity
Fragmentation
Continues to Drive Security Risk
🔐
Cybersecurity
guidepointsecurity.com
·
10h
New solution
aids
rapid recovery from identity
incidents
💻
Hacking
betanews.com
·
1d
Expanding
digital
IDs
in India and around the world
💻
Hacking
blog.google
·
3d
·
r/singapore
Crypto for
Advisors
: Breaking down the
Sui
blockchain
✅
Compliance
coindesk.com
·
12h
AAuth
💻
Hacking
aauth.dev
·
1d
·
Hacker News
Building a Global
Standard
for Trust and Safety
✅
Compliance
aei.org
·
17h
Is your
connected
product ready for the Cyber
Resilience
Act?
✅
Compliance
iotinsider.com
·
1d
Building public
legitimacy
for digital
ID
in the UK
🔍
OSINT
adalovelaceinstitute.org
·
4d
Which Face and Whose Identity? Solving the Dual Challenge of Deepfake
Proactive
Forensics
in Multi-Face Scenarios
🔍
OSINT
arxiv.org
·
23h
Verifying
your age in a privacy preserving
manner
🔏
Privacy
adayinthelifeof.nl
·
1d
·
Hacker News
,
Hacker News
CISA
and Partners
Publish
Zero Trust Guidance For OT Security
✅
Compliance
infosecurity-magazine.com
·
13h
Identity verification fraud prevention: How
IDV
platforms can
eliminate
blind spots with device intelligence
🕵️
Threat Intelligence
fingerprint.com
·
3d
What are the most common
authentication
methods
?
💻
Hacking
techtarget.com
·
1d
Clinical
Skin
Wellness
✅
Compliance
truebotanicals.com
·
6h
Identity
as the OS for AI Security
🔍
OSINT
cloudsecurityalliance.org
·
1d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help