The One Algorithm That Makes Distributed Systems Stop Falling Apart When the Leader Dies
medium.comΒ·20hΒ·
🀝Consensus Protocols
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.ioΒ·1d
πŸ—„οΈPostgreSQL WAL
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgΒ·1d
🎭Cultural Informatics
Flag this post
LimeDB: Architectural Shift to a Go-based Distributed Key-Value Store with Consistent Hashing
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”ŒInterface Evolution
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.comΒ·1d
🎯NTLM Attacks
Flag this post
Found some old pictures of my homelab from 2019
reddit.comΒ·8hΒ·
Discuss: r/homelab
🏠Homelab Archaeology
Flag this post
Building JARVIS Properly - Phase 5: From Ultron's Ruins to JARVIS's Foundation
blog.scottlogic.comΒ·1d
πŸ¦‹Format Evolution
Flag this post
Show HN: YaraDB Python Client – A clean interface for my custom WAL-based DB
github.comΒ·3dΒ·
Discuss: Hacker News
πŸ›οΈByzantine Archival
Flag this post
Cryptology Group Held an Election, but Can’t Decrypt the Results
nytimes.comΒ·1dΒ·
πŸ”Archive Cryptanalysis
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
security.googleblog.comΒ·2dΒ·
🌐WebRTC Archives
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.orgΒ·2d
🏺Format Archaeology
Flag this post
rpki-client seeks €300K in funding by 2026 to sustain development
discoverbsd.comΒ·2d
πŸ”ŒOperating system internals
Flag this post
A dream of AI DLC A peek into the future based on tools and tech that we have
magistr.meΒ·10hΒ·
Discuss: Hacker News
βš™οΈProof Engineering
Flag this post
A report from our 2025 conference on β€˜Records at Risk’
britishrecordsassociation.org.ukΒ·3d
πŸ“‹records management
Flag this post
The Evolving Ethics of Medical Data Stewardship
arxiv.orgΒ·2d
βš–οΈArchive Ethics
Flag this post
HashiCorp Vault is overhyped, and Mozilla SOPS with KMS and Git is underrated
oteemo.comΒ·2dΒ·
Discuss: Hacker News
πŸ”Archive Encryption
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
nocomplexity.substack.comΒ·18hΒ·
Discuss: Substack
πŸ”—Dependency Resolution
Flag this post
Outline for a European Books Data Commons
openfuture.euΒ·2d
πŸ“šMARC Archaeology
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.comΒ·1d
🏠Homelab Security
Flag this post