Feeds to Scour
SubscribedAll
Scoured 15587 posts in 917.6 ms
FEATURE - Building Frameworks for Long-Term Digital Preservation
infotoday.comยท1d
๐Ÿ›๏ธOAIS Implementation
Preview
Report Post
QERS: Quantum Encryption Resilience Score for Post-Quantum Cryptography in Computer, IoT, and IIoT Systems
arxiv.orgยท1d
๐Ÿ”Quantum Security
Preview
Report Post
Secret Management with SOPS
unixorn.github.ioยท2d
๐Ÿ“ฆContainer Security
Preview
Report Post
What Is Data Leakage
securityscorecard.comยท13h
๐Ÿ•ณ๏ธInformation Leakage
Preview
Report Post
Internet Archive's Storage
blog.dshr.orgยท1dยท
๐ŸŒArchive Networks
Preview
Report Post
Privacy-Preserving Active Learning for heritage language revitalization programs with zero-trust governance guarantees
dev.toยท20hยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
Preview
Report Post
Archiving Machines
mitpress.mit.eduยท3d
๐Ÿค–Archive Automation
Preview
Report Post
Alice and Bob in Wonderland - Identity and authority without servers (2024)
herbcaudill.comยท1dยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Preview
Report Post
Software Heritage Archive recognized as a digital public good
softwareheritage.orgยท21h
๐ŸบFormat Archaeology
Preview
Report Post
Rubrik, Inc. (RBRK) Presents at Data Recovery Summit Transcript
seekingalpha.comยท6h
๐Ÿ—„๏ธDatabase Recovery
Preview
Report Post
Digital Forensics Round-Up, January 21 2026
forensicfocus.comยท14h
๐Ÿ”Audio Forensics
Preview
Report Post
Attackers are getting stealthier โ€“ how can defenders stay ahead?
techradar.com
ยท15h
๐ŸŽฏThreat Hunting
Preview
Report Post
Treat Data Like Hazardous Material: Risks of Over-Collection and Retention
lmgsecurity.comยท2h
๐Ÿ”—Data Provenance
Preview
Report Post
Quantum cryptography beyond key distribution: Theory and experiment
link.aps.orgยท1d
๐Ÿ”Quantum Cryptography
Preview
Report Post
Canonicalize Your Web Identity and Achieve Data Sovereignty with PESOS
shellsharks.comยท12h
๐Ÿ Personal Archives
Preview
Report Post
The Silent AI Breach: How Data Escapes in Fragments
hackernoon.comยท10h
๐Ÿ”“Hacking
Preview
Report Post
SSDF 1.2 recognizes AppSec is a journey
reversinglabs.comยท17h
โœ…Archive Fixity
Preview
Report Post
22.00.0177 Backups aren't enough: create 'restore points'
johnnydecimal.comยท15h
๐Ÿ’ฟBackup Strategies
Preview
Report Post
The challenges of soft delete
atlas9.devยท2dยท
Discuss: Hacker News
๐ŸงฌPostgreSQL Forensics
Preview
Report Post
Compliance fundamentals: Building a resilient and intelligent recordkeeping system | Insights
bloomberg.comยท1d
โš–๏ธLegal Compliance
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help