Feeds to Scour
SubscribedAll
Scoured 15555 posts in 146.9 ms
Digital Forensics Round-Up, January 21 2026
forensicfocus.com·15h
🔍Audio Forensics
Preview
Report Post
Legal Retrieval for Public Defenders
arxiv.org·3h
🔤Morris-Pratt
Preview
Report Post
Redacting Faces, People, Vehicles, and Plates with Amped Replay Assisted Redaction
blog.ampedsoftware.com·17h
🧪Archive Fuzzing
Preview
Report Post
Treat Data Like Hazardous Material: Risks of Over-Collection and Retention
lmgsecurity.com·4h
🔗Data Provenance
Preview
Report Post
Judge orders stop to FBI search of devices seized from Washington Post reporter
arstechnica.com·8h
⚖️Legal Compliance
Preview
Report Post
Forensic readiness for autonomous mobility: The forensic incident recorder and information system concept
sciencedirect.com·2d
🚨Incident Response
Preview
Report Post
Auditing Meta and TikTok Research API Data Access under Article 40(12) of the Digital Services Act
arxiv.org·1d
🎓Academic Torrents
Preview
Report Post
What Aviation Teaches Us About Auditing
docs.eventsourcingdb.io·2h·
Discuss: Hacker News
🔗Data Provenance
Preview
Report Post
Filming ICE is legal but exposes you to digital tracking. Here's how to minimize the risk
phys.org·14h
💿DAT Forensics
Preview
Report Post
Compliance fundamentals: Building a resilient and intelligent recordkeeping system | Insights
bloomberg.com·1d
⚖️Legal Compliance
Preview
Report Post
FBI's Washington Post Investigation Shows How Your Printer Can Snitch On You
hardware.slashdot.org·6h
📄PDF Forensics
Preview
Report Post
Show HN: Link Graph Analysis Tool for Osint Analysts with 70 Transforms
webvetted.com·19h·
Discuss: Hacker News
🌐WARC Forensics
Preview
Report Post
What does data ownership really mean?
prepend.com·1d
🔗Data Provenance
Preview
Report Post
Who owns your data?
werd.io·1d·
Discuss: Hacker News
🏠Personal Archives
Preview
Report Post
There's a secret computer inside your computer
xda-developers.com·11h
🔒Secure Boot
Preview
Report Post
What Is Data Leakage
securityscorecard.com·14h
🕳️Information Leakage
Preview
Report Post
Nukeproof: Manifesto for European Data Sovereignty
nukeproof.org·20h·
Discuss: Hacker News
🏷️Metadata Standards
Preview
Report Post
cognitect/transit-format: A data interchange format.
github.com·19h·
Discuss: Hacker News
📋Format Specification
Preview
Report Post
Make Identity Threat Detection your security strategy for 2026
bleepingcomputer.com·1d
🎯Threat Hunting
Preview
Report Post
Why Digital Forensic Triage Matters: A Cost-Benefit Analysis From The Field
forensicfocus.com·1d
🚨Incident Response
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help