Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ก๏ธ Privacy Engineering
Data Minimization, Privacy by Design, Differential Privacy, GDPR
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
123355
posts in
559.7
ms
Towards a Standard for
JSON
Document
Databases
muratbuffalo.blogspot.com
ยท
1d
ยท
Discuss:
Blogger
๐
MLSecOps
Manufacturing
QMS
Software
samrian.com
ยท
1d
ยท
Discuss:
Hacker News
โ๏ธ
AI Governance
When machines remember us:
Rethinking
privacy in the age of
humanoids
techradar.com
ยท
1d
โ๏ธ
AI Governance
Boundary
Engineering
cabreza.substack.com
ยท
4d
ยท
Discuss:
Substack
โ๏ธ
AI Governance
A Defense in
Depth
Approach to Cloud Security
dev.to
ยท
19h
ยท
Discuss:
DEV
๐
cybersecurity
The Worldโs Best
Retro
Light
Gun
!
retroshooter.com
ยท
1d
โ
compliance
T_
Jacopo-Ottaviani
_49_
Connecting-the-Dots-Investigating-in-Data-Scarce-Contexts-Data-Scarcity-and-how-to-overcome-it-Tipsheet.xlsx
docs.google.com
ยท
3d
โ๏ธ
AI Governance
How to Keep What You Built
Together
claudepress.substack.com
ยท
1d
ยท
Discuss:
Substack
โ๏ธ
AI Governance
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
ยท
1d
ยท
Discuss:
Hacker News
โ ๏ธ
Risk Management
SecretSpec
0.7:
Declarative
Secret Generation
devenv.sh
ยท
2d
ยท
Discuss:
Lobsters
,
Hacker News
,
r/NixOS
,
r/programming
๐
MLSecOps
Structured
Context Engineering for File-Native
Agentic
Systems
simonwillison.net
ยท
1d
๐
MLSecOps
Google now helps you
wipe
your
sensitive
personal data and photos from Search
digitaltrends.com
ยท
15h
๐
cybersecurity
Data teams should become
context
teams
thenewaiorder.substack.com
ยท
1d
ยท
Discuss:
Substack
โ๏ธ
AI Governance
Ethereum Signature Schemes Explained: ECDSA, BLS,
XMSS
, and Post-Quantum
leanSig
with Rust Code Examples
blog.lambdaclass.com
ยท
1d
๐
MLSecOps
Qwen-Image
2.0 and
Seedance
2.0
news.smol.ai
ยท
1d
๐
MLSecOps
Is Your Private Information
Logged
? An
Empirical
Study on Android App Logs
arxiv.org
ยท
1d
๐
cybersecurity
Securing
the Digital
Nerve
System: A Practical Guide to Implementing Zero Trust API Security
hackernoon.com
ยท
1d
๐
cybersecurity
eVer: Universal and Automated Verification of Side-Channel Security for
Additive
, Inner Product, Polynomial and General Code-Based
Masking
eprint.iacr.org
ยท
1d
๐
MLSecOps
Protecting
emotional
well-being in the age of AI.
thehumanlineproject.org
ยท
2d
โ๏ธ
AI Governance
An automated geometric space
curve
approach for designing dynamically
corrected
gates
nature.com
ยท
20h
๐
MLSecOps
Loading...
Loading more...
« Page 5
โข
Page 7 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help