Why blockchain verification could eliminate Indonesia's $22 billion fake degree problem
hackernoon.comยท9h
๐Ÿ”—Hash Chains
Proposal: Deconfig โ€“ Distributed Git Infrastructure with Durable Objects
github.comยท19hยท
Discuss: Hacker News
๐Ÿ“ฆGit LFS
A disenshittification moment from the land of mass storage
doctorow.medium.comยท7h
๐ŸงฒMagnetic Philosophy
Ensuring Safe and Reliable Updates with Qualys TruRiskโ„ข Manifest Version Control
blog.qualys.comยท1d
โœ…Archive Fixity
Turning data into knowledge: How Huawei is upgrading storage for the AI era
techradar.comยท1d
๐Ÿ’พPersistence Strategies
๐Ÿ”ฅ Smart Contracts Explained โ€” The Code That Executes Itself
dev.toยท6hยท
Discuss: DEV
๐Ÿ”—Hash Chains
New Articles: Journal of Contemporary Archival Studies
archivespublishing.comยท1d
โš–๏ธArchive Ethics
From Static Rate Limiting to Adaptive Traffic Management in Airbnbโ€™s Key-Value Store
medium.comยท1d
๐ŸŒŠStreaming Systems
Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
infosecwriteups.comยท7h
๐Ÿ Homelab Federation
People rescuing forgotten knowledge trapped on old floppy disks
bbc.comยท6hยท
Discuss: Hacker News
๐Ÿ“ผCassette Archaeology
TCDRM: A Tenant Budget-Aware Data Replication Framework for Multi-Cloud Computing
arxiv.orgยท15h
๐Ÿ’พStorage Replication
Autonomous architecture - problem description
disruptivearchitecture.infoยท10h
๐ŸŒŠStreaming Systems
QUIC! Jump to User Space!
hackaday.comยท3h
๐ŸŒNetwork Protocols
The Day I Hacked XCTrack
blog.syrac.orgยท4hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Right-Sizing AI for the Edge: Power, Models and Security
thenewstack.ioยท1d
๐Ÿ–ฅ๏ธModern Terminals
Linear Risk Sharing on Networks
freakonometrics.hypotheses.orgยท20h
๐ŸคConsensus Networks
This Company Wants Everyone to Earn Money From Streams โ€” Even Fans
rollingstone.comยท1h
๐Ÿ”BitFunnel
It takes a Kraken to scan billions of source files
softwareheritage.orgยท2d
๐Ÿ Homelab Archaeology
What Is Digital Supply Chain Management
securityscorecard.comยท3h
๐Ÿ”—Supply Chain
Zero-day in file-sharing software leads to RCE, and attacks are ongoing
theregister.comยท3h
๐Ÿ’ฃZIP Vulnerabilities