Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🆔 Self-sovereign Identity
Decentralized Identity, Digital Credentials, User Control, Privacy
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
83125
posts in
2.60
s
Digital
form
services by
Govforms
Digital
govforms.co.uk
·
18h
·
Discuss:
Hacker News
💻
Civic Technology
Google's Cyber
Disruption
Unit
Kicks
Its First Goal
lawfaremedia.org
·
10h
·
Discuss:
Hacker News
🦋
ATProto
Case Study: From "Zero Infrastructure" to Full
Corporate
Compliance
jasonneilsoto.com
·
9h
💾
Local-first Software
AI Can
Easily
Crack Your
Passwords
– Tips to Create Strong
Passwords
maketecheasier.com
·
1d
🤖
AI Ethics
The
Sky
's the
Limit
: Why
Sky
Computing is the Cloud’s Future
superorbital.io
·
1d
💾
Local-first Software
Install an
SSL
Certificate
from a Commercial
Certificate
Authority
digitalocean.com
·
17h
🏠
Self-Hosting
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
1d
·
Discuss:
Hacker News
💾
Local-first Software
Digging into
UUID
,
ULID
, and implementing my own
atlas9.dev
·
2d
·
Discuss:
Hacker News
🚌
GTFS
Introduction
devguard.org
·
1d
🚪
User Onboarding
Day 5 AWS Shared Responsibility Model
andAWS
Well-Architected
Framework (5 Pillars)
blog.devops.dev
·
17h
🏗️
System Design
Living off the AI: The Next Evolution of
Attacker
Tradecraft
securityweek.com
·
16h
🎭
Anthropic Claude
Crypto-asset
Taxonomy
for Investors and
Regulators
arxiv.org
·
23h
📰
Content Curation
ASP.NET
Core
JWT
Authentication: Setup, Validation, and Best Practices
dev.to
·
2d
·
Discuss:
DEV
🦋
ATProto
The Dark Patterns I
Refuse
to Build: A Developer's
Lexicon
indiehackers.com
·
13h
🫧
Filter Bubbles
Gone Phishing, Got a Token: When Separate
Flaws
Combine
praetorian.com
·
2d
·
Discuss:
DEV
🦋
ATProto
Building
greater
resilience and
capacity
in the US national security industrial base
brookings.edu
·
7h
🌾
Commons Governance
SIDeR
: Semantic Identity Decoupling for
Unrestricted
Face Privacy
arxiv.org
·
23h
🎭
Anthropic Claude
Building a Privacy-First
URL
Shortener
on Blockchain
dev.to
·
19h
·
Discuss:
DEV
🌐
IndieWeb
Trust-Centered Digital Products Through Secure Design — Lessons Informed by Suzanne
Alipourian-Frascogna
future.forem.com
·
1d
·
Discuss:
DEV
🎨
Design Systems
From
ALB
to Caddy - Our
Wandering
Path to Supporting Thousands of Domain Names
fusionauth.io
·
1d
·
Discuss:
Hacker News
🏠
Self-Hosting
Loading...
Loading more...
« Page 4
•
Page 6 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help