Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Digital Privacy
Encryption, Self-hosted Services, Data Sovereignty, P2P Networks
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
171470
posts in
16.3
ms
Privacy vs.
Visibility
: Can We Have Both in a
Censored
Internet?
Β
π‘οΈ
AI Security
medium.com
Β·
7h
Anamorphic
Encryption with
CCA
Security: A Standard Model Construction
Β
π‘οΈ
AI Security
arxiv.org
Β·
4d
Citizen Lab:
Webloc
tracked
500M
devices for global law enforcement
Β
π
Security
securityaffairs.com
Β·
1d
United States
Residential
Proxy: Why Local IP Accuracy Matters for
SERP
, Ads, and Pricing
Β
π‘οΈ
AI Security
freecodecamp.org
Β·
4h
#
PrivacyCamp25
: Event
summary
Β
π
Security
europedigital.cloud
Β·
13h
Lightweight multi-client
order-revealing
encryption with limited
leakage
Β
π
Security
sciencedirect.com
Β·
1d
Data Security
Posture
Reports
Β
π
Security
techcommunity.microsoft.com
Β·
5h
Understanding Dark Web Privacy Tools and Their Role Online
Β
π
OAuth 2.0
medium.com
Β·
4d
Show HN: Zero-identity
messaging
app with physics-based post-quantum
encryption
Β
π
Security
news.ycombinator.com
Β·
1d
Β·
Hacker News
The Global Battle for Data Control: How the 2026 U.S. Report on Trade
Barriers
Targets Data
Sovereignty
Worldwide
Β
π‘οΈ
Cybersecurity
michaelgeist.ca
Β·
10h
Press freedom group asks US lawmakers for
transparency
over alleged
VPN
surveillance
Β
π
Security
techradar.com
Β·
6h
a
localhost
proxy that
substitutes
your device fingerprint
Β
π
Security
404privacy.com
Β·
4h
Β·
Hacker News
Surfshark
Just Dropped a Next-Gen VPN Protocol That Could Be Faster and More Secure Than Other VPN
Connections
Β
π
OAuth 2.0
cnet.com
Β·
1d
Breaking the
stranglehold
: Responses to data
sovereignty
risk
Β
ποΈ
Systems Design
computerweekly.com
Β·
4d
LiteLLM
Β
π
Technical Writing
dsebastien.net
Β·
13h
Cloud platform for
managing
your privacy
policies
Β
π
OAuth 2.0
plus.openpolicy.sh
Β·
2d
Β·
Hacker News
Edward
Snowden
: What Changed, What Didn't
Β
π
Security
stateofsurveillance.org
Β·
4h
Β·
r/privacy
European Data
Protection
Board
Β
ποΈ
Zettelkasten
edpb.europa.eu
Β·
6h
adityarai0133-rajput/Aadi-tech-vault
-: A lightweight encryption system based on aes 256 by Aditya Rai aadi-tech from
laksar
Β
π
Reverse Engineering
github.com
Β·
5d
Β·
DEV
Tor explores β
stateless
β
relays
to prevent data exposure from server seizures
Β
π
Security
discuss.privacyguides.net
Β·
2d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help