🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Archive Verification

Formal Proofs, Storage Correctness, Integrity Checking, Preservation Logic

Semcheck: Spec-Driven Development Using LLMs
labs.rejot.dev·17h·
Discuss: Hacker News
⚡Proof Automation
AI Agents Need Data Integrity
schneier.com·21h·
Discuss: www.schneier.com
🛡️Preservation Proofs
Go Beyond Viper and Cobra: Declarative Field-Driven Configuration for Go Apps
dev.to·6h·
Discuss: DEV
📋Format Specification
Ways Your Collection Can Bite the Dust
andersonarchival.com·2d
✅Archive Proofs
Derek Elkins: Arithmetic Functions
hedonisticlearning.com·9h
⚔️Lean Theorem
SafeLLM: Unlearning Harmful Outputs from Large Language Models against Jailbreak Attacks
arxiv.org·1d
💻Local LLMs
Cloud Storage Myths Debunked, Part Three: Onboarding Specialized Providers Is Too Hard
backblaze.com·18h
💾Storage Replication
Learning Through Doing: From one language to another
blog.scottlogic.com·1d
🦀Rust Borrowing
From Transcripts to Descriptions: Using Consumer AI Tools for Audio Collection Metadata
saaers.wordpress.com·2d
🔄Archival Workflows
Accelerate intelligent document processing with generative AI on AWS
aws.amazon.com·15h
🤖Archive Automation
My Zip Isn't Your Zip: Identifying and Exploiting Semantic Gaps Between Parsers
usenix.org·1d·
Discuss: Hacker News
💣ZIP Vulnerabilities
Pgschema: Postgres Declarative Schema Migration, Like Terraform
pgschema.com·16h·
Discuss: Hacker News
🚚Data Migration
Live and Let Die: Rethinking Personal Digital Archiving, Memory, and Forgetting Through a Library Lens
lil.law.harvard.edu·2d
🧲Magnetic Philosophy
It's okay to solve a problem twice
til.andrew-quinn.me·57m·
Discuss: Hacker News
⚡Proof Automation
CodeSOD: Copy of a Copy of a
thedailywtf.com·3d
🌲B-tree Forensics
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.com·17h
🔐Cryptographic Archaeology
Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure
lab.wallarm.com·1d
🛡️CLI Security
Welcome to Remix 3
github.com·15h·
Discuss: Hacker News
🦋Format Metamorphosis
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
hackaday.com·18h
🔓Hacking
How to Perform Comprehensive Large Scale LLM Validation
towardsdatascience.com·1d
✅Formal Methods
Loading...Loading more...
AboutBlogChangelogRoadmap