🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Archive Encryption

Long-term Cryptography, Key Management, Preservation Security, Data Protection

Show HN: SecretMemoryLocker – Q&A-Style Archive for Your Digital Life
secretmemorylocker.comΒ·17hΒ·
Discuss: Hacker News
🦠Parasitic Storage
Live and Let Die: Rethinking Personal Digital Archiving, Memory, and Forgetting Through a Library Lens
lil.law.harvard.eduΒ·23h
🧲Magnetic Philosophy
β€˜The Immutable Laws of Security’ at 25: 5 corollaries for a new era
reversinglabs.comΒ·1d
πŸ”’WASM Capabilities
# How I Built a Fully Decentralized On-Chain Game with 0 Lines of Code, Thanks to Gemini
dev.toΒ·23hΒ·
Discuss: DEV
🌳Archive Merkle Trees
Quantum-safe security: Progress towards next-generation cryptography
microsoft.comΒ·1d
πŸ”Quantum Security
Digital Forensics Round-Up, August 20 2025
forensicfocus.comΒ·1d
πŸ“ŸTerminal Forensics
From Transcripts to Descriptions: Using Consumer AI Tools for Audio Collection Metadata
saaers.wordpress.comΒ·1d
πŸ”„Archival Workflows
How Architectural Controls Help Can Fill the AI Security Gap
darkreading.comΒ·3h
πŸ”’Language-based security
Ways Your Collection Can Bite the Dust
andersonarchival.comΒ·1d
βœ…Archive Proofs
My Zip Isn't Your Zip: Identifying and Exploiting Semantic Gaps Between Parsers
usenix.orgΒ·13hΒ·
Discuss: Hacker News
πŸ’£ZIP Vulnerabilities
Episciences links article code through Software Heritage
softwareheritage.orgΒ·7h
πŸ›οΈOAIS Implementation
FTP Security Risks, Vulnerabilities & Best Practices Guide
securityscorecard.comΒ·3d
πŸ“‘Feed Security
Proxmox Backup Server (PBS) 4.0 Blog Series
derekseaman.comΒ·2h
πŸ’ΎProxmox Storage
Mobile security and DSPT: a guide for NHS Trusts
jamf.comΒ·7h
πŸ”€EBCDIC Privacy
SecureBitChat v4.01.412 Release
github.comΒ·17mΒ·
Discuss: Hacker News
🌐NetworkProtocols
Tearing Apart the Undetected (OSX)Coldroot RAT
objective-see.comΒ·2h
πŸ“ŸTerminal Forensics
US CERT/CC warns of flaws in Workhorse Software accounting software used by hundreds of municipalities in Wisconsin
securityaffairs.comΒ·15h
πŸ”CBOR
Commvault: High-risk gap allows malicious code to be injected
heise.deΒ·1d
πŸ”“Hacking
Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure
lab.wallarm.comΒ·11h
πŸ›‘οΈCLI Security
A Conceptual Model for Storage Unification
jack-vanlightly.comΒ·9hΒ·
Discuss: Lobsters, Hacker News
🌐Edge Preservation
Loading...Loading more...
AboutBlogChangelogRoadmap