🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔬 Archive Forensics

Digital Evidence, File Carving, Metadata Recovery, Timeline Analysis

6 Living Men Share Leonardo da Vinci’s DNA. They Might Prove Where He’s Buried.
popularmechanics.com·1d
🏰Manuscript Networks
Journal let authors make undisclosed changes that masked stolen content in paper
retractionwatch.com·1h
💧Manuscript Watermarks
Budgeting for a PQC Future
medium.com·10h
🔐Quantum Security
Dealing With the 1970s EPROM Chaos in 2025
hackaday.com·2d
🖥Retro Computing
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.com·5h
👁️System Observability
A.I. Is Coming for Culture
newyorker.com·1d
🎯Content Recommendation
Beyond the ban: A better way to secure generative AI applications
blog.cloudflare.com·1d
🔒Language-based security
Video Platform Kick Investigated Over Streamer's Death
news.slashdot.org·6h
🕵️Network Forensics
Learn how Amazon Health Services improved discovery in Amazon search using AWS ML and gen AI
aws.amazon.com·3h
👤Search Personalization
Next-gen voice, video, and chat messaging using your domain name not your number
thunderbolt.com·2d·
Discuss: Hacker News
🔌Operating system internals
Starting In Biotech: An overview of biotech for the curious engineer
blog.zkagin.com·4h·
Discuss: Hacker News
🔗Data Provenance
I am smarter than ChatGPT (at Clues by Sam)
goose.leaflet.pub·1d·
Discuss: Hacker News
🔲Cellular Automata
Memory optimizations to reduce CPU costs
ayende.com·1d·
Discuss: Hacker News
📝Text Compression
The history of digital ethics
arxiv.org·17h
⚖️Archive Ethics
APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
cloudsek.com·3d·
Discuss: r/linux
💣ZIP Vulnerabilities
My Zip Isn't Your Zip: Identifying and Exploiting Semantic Gaps Between Parsers
usenix.org·5d·
Discuss: Hacker News
💣ZIP Vulnerabilities
Probabilistic Classification of Near-Surface Shallow-Water Sediments using A Portable Free-Fall Penetrometer
arxiv.org·17h
🔍Vector Forensics
k-NN Classification and Model Evaluation
dev.to·14h·
Discuss: DEV
🧠Machine Learning
Canary tokens: Learn all about the unsung heroes of security at Grafana Labs
grafana.com·16m·
Discuss: Hacker News
🏺Kerberos Archaeology
New Jersey prisoner laments reliance on floppy disks for appeals documents, limiting file sizes to 1.44 MB — prisoners allowed 20 floppy disks in cell, but USB ...
tomshardware.com·1d·
Discuss: Hacker News
💽Floppy disks
Loading...Loading more...
AboutBlogChangelogRoadmap