Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ก๏ธ Data Sovereignty
Data Ownership, Privacy Rights, User Control, Digital Autonomy
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
174002
posts in
20.9
ms
Musings
on 'digital
sovereignty
'
neilzone.co.uk
ยท
3h
๐
Self-sovereign Identity
GDPR
: The Law That Changed How the Internet
Handles
Your Data
medium.com
ยท
9h
๐
Open Government
How
Synology
is helping businesses achieve digital
sovereignty
in the AI era
tweaktown.com
ยท
16h
๐พ
Local-first Software
Personal Digital
Sovereignty
blog.cornelius-schumacher.de
ยท
4d
๐
Self-sovereign Identity
Grant,
Verify
,
Revoke
: A User-Centric Pattern for Blockchain Compliance
arxiv.org
ยท
1d
๐
Self-sovereign Identity
Data Privacy Court Case Highlights
Compliance
Queries
in AI Age
news.bloomberglaw.com
ยท
1d
๐ป
Technology Policy
Introducing Microsoft
Purview
: A Beginnerโs
Overview
princetonits.com
ยท
18h
๐พ
Local-first Software
Digital Public Infrastructure: The
Foundation
of Modern Digital
Societies
vijaykoppa.medium.com
ยท
17h
๐ป
Digital Democracy
Vanta
: Security
Compliance
, Made Simple
medium.com
ยท
1d
๐พ
Local-first Software
This rise of the
splinternet
? Data
sovereignty
risks and responses
computerweekly.com
ยท
6d
๐
Self-sovereign Identity
The
Decentralisation
Paradox in Digital Identity:
Centralising
Decentralisation
with Digital Wallets?
arxiv.org
ยท
1d
๐
Self-sovereign Identity
Europeโs digital
autonomy
โ between fault lines and
vault
lines
mostlyeconomics.wordpress.com
ยท
5d
๐ท
Worker Self-Management
Introducing Custom
Regions
for
precision
data control
blog.cloudflare.com
ยท
17h
๐พ
Local-first Software
Generative
Specification
: A Pragmatic Programming Paradigm for the
Stateless
Reader
zenodo.org
ยท
3h
ยท
Discuss:
DEV
๐ญ
Code Generation
The
Disposable
Identity:
Eliminating
Non-Human Identity Risk in Federal Healthcare Pipelines
usenix.org
ยท
8h
๐
Self-sovereign Identity
Five
lessons
from three years of risk
assessments
under the Digital Services Act
europedigital.cloud
ยท
19h
๐ฐ
Content Curation
Part 2: Zero-Copy data federation
Snowflake
Customer 360 Data to Salesforce Sales
Reps
dev.to
ยท
10h
ยท
Discuss:
DEV
๐ฅถ
Cold Start Problem
Internet Number
Resources
Are Not Political
Property
circleid.com
ยท
11h
๐
Self-sovereign Identity
Do You Own Your Digital Self?
futurecitizen.bearblog.dev
ยท
1d
๐
Self-sovereign Identity
The
Lawful
Access Privacy Risks: Unpacking Bill C-22โs
Expansive
Metadata Retention Requirements
michaelgeist.ca
ยท
1d
๐
Digital Archiving
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help