PaperJet โ€“ privacy-first document processing
getpaperjet.comยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธPrivacy Engineering
Flag this post
10 things in life you should always keep private (if you want to maintain your dignity)
artfulparent.comยท18h
๐Ÿ›ก๏ธPrivacy Engineering
Flag this post
Copier Uptime Without the Drama: A Practical Playbook for Offices That Hate Fire Drills
open.forem.comยท15hยท
Discuss: DEV
๐Ÿ”’MLSecOps
Flag this post
The Privacy Manifesto
zac1258019.substack.comยท2dยท
Discuss: Substack
โš–๏ธAI Governance
Flag this post
The Anatomy of a Data Breach: From Stolen Details to Stolen Identities
cyberthreatalliance.orgยท3d
๐Ÿ› cybersecurity
Flag this post
Report: Government data mining has gone too far โ€“ and AI will make it worse
cyberscoop.comยท2d
โš–๏ธAI Governance
Flag this post
GiftFlow: Self-hosted gift management with reimbursement tracking
github.comยท10hยท
Discuss: r/selfhosted
๐Ÿ›ก๏ธPrivacy Engineering
Flag this post
Zero-Knowledge Architecture: Privacy by Design
dev.toยท2dยท
Discuss: DEV
๐Ÿ›ก๏ธPrivacy Engineering
Flag this post
Building my first homelab for home & business
imgur.comยท1dยท
Discuss: r/homelab
โš ๏ธRisk Management
Flag this post
Understanding prompt injections: a frontier security challenge
openai.comยท2d
๐Ÿ”’MLSecOps
Flag this post
Model-Based GUI Automation (Springer SoSyM)
link.springer.comยท6hยท
Discuss: Hacker News
๐Ÿค–AI
Flag this post
From DataWareHouses to BigData Systems: What and Why - Questions that nobody asks, but you should!
dev.toยท1dยท
Discuss: DEV
โš ๏ธRisk Management
Flag this post
Kawaiicon 3 - Day 2
rodger.donaldson.gen.nzยท1d
๐Ÿ› cybersecurity
Flag this post
From Auth to Action: Guide to Secure and Scalable AI Agent Infrastructure
composio.devยท1dยท
Discuss: Hacker News
โš–๏ธAI Governance
Flag this post
It's always DNS
dev.toยท12hยท
Discuss: DEV
๐Ÿ› cybersecurity
Flag this post
The Secrets of Cyber Security That Experts Don't Share
dev.toยท2dยท
Discuss: DEV
๐Ÿ› cybersecurity
Flag this post
AI/ LLM Hacking โ€” Part 6 โ€” Excessive Agency | Insecure Plugin
infosecwriteups.comยท16h
๐Ÿ”’MLSecOps
Flag this post
Notes from "Tor: From the Dark Web to the Future of Privacy"
evanhahn.comยท2d
๐Ÿ›ก๏ธPrivacy Engineering
Flag this post
Hyper-Specific Sub-Field Selection: **Predictive Maintenance of Semiconductor Fabrication Equipment**
dev.toยท2dยท
Discuss: DEV
โš ๏ธRisk Management
Flag this post