Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Privacy Engineering
Data Minimization, Privacy by Design, Differential Privacy, GDPR
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
5356
posts in
17.6
ms
Balancing
the privacy-utility trade-off: How to draw reliable
conclusions
from private data
arxiv.org
·
2d
🕸️
Graph Theory
Scaling
Privacy Threat Modeling: From
Architects
to Developers
usenix.org
·
3h
🛡️
macOS Security
The Emperor's New Embeddings:
Obfuscating
ML
Inputs
Doesn't Provide Privacy
usenix.org
·
3h
❓
Existential Types
Training on Documents About Monitoring Leads To
CoT
Obfuscation
lesswrong.com
·
2h
📊
Runtime Verification
I built a
GDPR
analytics
alternative to Google
Analytics
eurometrics.eu
·
5d
·
Discuss:
Hacker News
🌐
ActivityPub
Vector
, the Journal of the British
APL
Association
web.archive.org
·
3h
·
Discuss:
Hacker News
🧮
Lambda Calculus
TrustAgentAI
– Cryptographic receipts for MCP tool calls (
non-repudiation
layer)
news.ycombinator.com
·
18h
·
Discuss:
Hacker News
🌐
NetworkProtocols
AI
enhanecd
development: the hard work is still in the
requirements
!
dev-log.me
·
13h
·
Discuss:
r/programming
🧮
Lean4
Learnability
and Privacy Vulnerability are
Entangled
in a Few Critical Weights
arxiv.org
·
2d
⏱️
Computational Complexity
Reverse-Engineering Outlook's Secret Database: Cracking
HxStore.hxd
with AI Agents
johnson.fyi
·
14h
·
Discuss:
Hacker News
🔤
Kleene Algebra
Secure Programming
HOWTO
- Information on
Creating
Secure Software
dwheeler.com
·
9h
·
Discuss:
Hacker News
🛡️
seL4
Less-relevant results
Britain plans to consider
requiring
labels on AI-generated content to protect consumers from
disinformation
and deepfakes, the government said
reuters.com
·
9h
⚖️
Weighted Automata
iPhone 18
rumors
say Pro models will get exclusive camera upgrade
9to5mac.com
·
6h
🍎
Apple
The
unwritten
laws
of software engineering
newsletter.manager.dev
·
1d
·
Discuss:
Hacker News
,
r/programming
🔧
DevOps
autonomous019/ahronov-bohm-cybersecurity
:
ahronov
bohm cybersecurity project arduino toroid coil as countermeasure to Red Team attack on neural hardware or wetware
github.com
·
14h
·
Discuss:
Hacker News
🩹
Self-Healing Systems
Jony Ive on
Redesigning
the Christie’s
Rostrum
youtube.com
·
1h
📺
Vintage Apple
Models
differ
in identity
propensities
lesswrong.com
·
2d
❓
Existential Types
Building an
LC
Meter with a Franklin
Oscillator
hackaday.com
·
14h
🔧
Microcontrollers
How to
Identify
Your Apple Keyboard
Layout
by Country or Region
support.apple.com
·
1h
🍎
Apple
Overcast
is gaining
transcripts
, and it will have an edge over Apple Podcasts
9to5mac.com
·
1h
🍎
Apple
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help