Three ways formally verified code can go wrong in practice
buttondown.comยท5h
๐Ÿ“œProof Carrying Code
Announcing the 2025 NDSA Excellence Award Winners
ndsa.orgยท9h
๐Ÿ›๏ธPREMIS Metadata
Debugging Humidity: Lessons from deploying software in the physical world
physical-ai.ghost.ioยท2hยท
Discuss: Hacker News
๐Ÿ›ก๏ธError Boundaries
An enough week
blog.mitrichev.chยท1dยท
๐ŸงฎZ3 Solver
Experimenting with ACL2 and Claude Code
mikedodds.orgยท9hยท
Discuss: Hacker News
๐Ÿ‘‘Isabelle
People rescuing forgotten knowledge trapped on old floppy disks
bbc.comยท9hยท
Discuss: Hacker News
๐Ÿ“ผCassette Archaeology
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.comยท12h
๐Ÿ’ŽInformation Crystallography
Welcome to LILโ€™s Data.gov Archive Search
lil.law.harvard.eduยท2h
๐Ÿ’พData Preservation
I am an SSD expert โ€“ here are 5 reasons why choosing a small SSD could cost you later
techradar.comยท7h
๐Ÿ›ก๏ธPreservation Logic
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท22hยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
The Why of PGP Authentication
articles.59.caยท9h
๐Ÿ”‘Cryptographic Protocols
Building the Reasoning Engine at Axiom
axiommath.aiยท2hยท
Discuss: Hacker News
โš”๏ธLean Tactics
Building Trust for AI Agents โ€” ISM-X: A Privacy-Preserving Identity Layer (with demo)
dev.toยท3hยท
Discuss: DEV
๐ŸŒณArchive Merkle Trees
Advanced ZFS Dataset Management: Snapshots, Clones, and Bookmarks
klarasystems.comยท2d
๐Ÿ“ธZFS Snapshots
A disenshittification moment from the land of mass storage
doctorow.medium.comยท10h
๐ŸงฒMagnetic Philosophy
New Articles: Journal of Contemporary Archival Studies
archivespublishing.comยท1d
โš–๏ธArchive Ethics
Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
infosecwriteups.comยท10h
๐Ÿ Homelab Federation
Cactus Language โ€ข Semantics 3
inquiryintoinquiry.comยท6h
๐Ÿ”ขDenotational Semantics