Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Data sovereignty
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
122503
posts in
1.55
s
Microsoft Announces Windows
Baseline
Security Mode and User Transparency and
Consent
thurrott.com
ยท
2d
โก
Railway Engineering
mattermost
notes.billmill.org
ยท
2d
๐ฑ
Kotlin
Digital Omnibus: EDPB and
EDPS
support
simplification
and competitiveness while raising key concerns
edpb.europa.eu
ยท
1d
๐๏ธ
Urban Planning
Introducing new token
formats
and secret
scanning
vercel.com
ยท
3d
๐ฑ
Kotlin
Databases
joodaloop.com
ยท
2d
๐๏ธ
Urban Planning
Matrix secure chat is quietly becoming the chat layer for
governments
chasing digital
sovereignty
gadgeteer.co.za
ยท
2d
๐๏ธ
Urban Planning
Just-in-Time
Ontological
Reframing
: Teaching Gemini to Route Around Its Own Safety Infrastructure
recursion.wtf
ยท
2d
๐ฑ
Kotlin
e Foundation -
deGoogled
unGoogled
smartphone operating systems and online services - your data is your data
e.foundation
ยท
11h
๐ฑ
Kotlin
Real-time infrastructure that
respects
your privacy
ephemeral.ws
ยท
2d
ยท
Discuss:
Hacker News
๐๏ธ
Urban Planning
A call to EU
legislators
: protect rights and reject the call to delete transparency
safeguard
in AI Act
accessnow.org
ยท
2d
๐๏ธ
Urban Planning
We found what ID ai tool
discord
is using to
scan
your ID and face.
k-id.com
ยท
2d
ยท
Discuss:
r/privacy
๐๏ธ
Urban Planning
MerkleSpeech
: Public-Key Verifiable,
Chunk-Localised
Speech Provenance via Perceptual Fingerprints and Merkle Commitments
arxiv.org
ยท
13h
๐ฑ
Kotlin
Amended
Input From Software Freedom Institute for EU
Consultation
on Free Software (updated)
techrights.org
ยท
1d
๐๏ธ
Urban Planning
Governance โข Re: archive.is -
malicious
actor, or serial copyright
violator
?
wikipediocracy.com
ยท
2d
๐ฑ
Kotlin
How One Engineer Turned Saudi Cloud
Compliance
from a 6-Month
Bottleneck
into a 2-Week Workflow
hackernoon.com
ยท
2d
๐ฑ
Kotlin
OpenCivics
opencivics.co
ยท
2d
๐๏ธ
Urban Planning
Grok, Deepfakes, and the Collapse of the
Content/Capability
Distinction
justsecurity.org
ยท
3d
โก
Railway Engineering
Upgraded
Google safety tools can now find and
remove
more of your personal info
arstechnica.com
ยท
2d
๐ฑ
Kotlin
Overcoming
Single-Vendor
Trap: Why True Open Source is the Best Path to Data Sovereignty
enterprisedb.com
ยท
3d
๐๏ธ
Urban Planning
ITSAKE
: an
unconditionally
secure authenticated key establishment protocol
eprint.iacr.org
ยท
2d
๐ฑ
Kotlin
Loading...
Loading more...
« Page 4
โข
Page 6 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help