The One Algorithm That Makes Distributed Systems Stop Falling Apart When the Leader Dies
π€Consensus Protocols
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.ioΒ·1d
ποΈPostgreSQL WAL
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgΒ·1d
πCultural Informatics
Flag this post
LimeDB: Architectural Shift to a Go-based Distributed Key-Value Store with Consistent Hashing
πInterface Evolution
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.comΒ·1d
π―NTLM Attacks
Flag this post
Building JARVIS Properly - Phase 5: From Ultron's Ruins to JARVIS's Foundation
blog.scottlogic.comΒ·1d
π¦Format Evolution
Flag this post
Show HN: YaraDB Python Client β A clean interface for my custom WAL-based DB
ποΈByzantine Archival
Flag this post
Cryptology Group Held an Election, but Canβt Decrypt the Results
πArchive Cryptanalysis
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
πWebRTC Archives
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.orgΒ·2d
πΊFormat Archaeology
Flag this post
rpki-client seeks β¬300K in funding by 2026 to sustain development
discoverbsd.comΒ·2d
πOperating system internals
Flag this post
A dream of AI DLC A peek into the future based on tools and tech that we have
βοΈProof Engineering
Flag this post
A report from our 2025 conference on βRecords at Riskβ
britishrecordsassociation.org.ukΒ·3d
πrecords management
Flag this post
The Evolving Ethics of Medical Data Stewardship
arxiv.orgΒ·2d
βοΈArchive Ethics
Flag this post
HashiCorp Vault is overhyped, and Mozilla SOPS with KMS and Git is underrated
πArchive Encryption
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
πDependency Resolution
Flag this post
Outline for a European Books Data Commons
openfuture.euΒ·2d
πMARC Archaeology
Flag this post
The web's infrastructure has a concentration problem, exposing us all to crushing outages β from AWS and Azure to Cloudflare, the perils of having a centralized...
tomshardware.comΒ·1d
πΈοΈMesh Networks
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.comΒ·1d
π Homelab Security
Flag this post
Loading...Loading more...