The Library Method: Understanding @cache
dev.to·18h·
Discuss: DEV
Cache Theory
A disenshittification moment from the land of mass storage
doctorow.medium.com·7h
🧲Magnetic Philosophy
The Day I Hacked XCTrack
blog.syrac.org·4h·
Discuss: Hacker News
🔐PKI Archaeology
ACMID: Automatic Curation of Musical Instrument Dataset for 7-Stem Music Source Separation
arxiv.org·15h
🎵Audio Formats
High-Quality Video Tape Conversion for Homes and Businesses
forums.anandtech.com·12h
📼Tape Simulation
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·1d
Archive Fixity
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·9h
💎Information Crystallography
A Manifesto for the Programming Desperado
github.com·3h·
Discuss: Hacker News
💻Programming languages
Running new applications on old glibc
lightofdawn.org·1d·
Discuss: Hacker News
🔗Static Linking
Evidence Preservation: Why iPhone Data Can Expire
blog.elcomsoft.com·1d
🌡️Preservation Entropy
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·1d·
Discuss: Hacker News
🛡️eBPF Security
The Legacy Code Survival Guide: Add Features Without Fear
understandlegacycode.com·3d
🔓Decompilation
An enough week
blog.mitrichev.ch·23h·
🧮Z3 Solver
Linux SBCs for development + RE
zetier.com·1d
🎯Emulator Accuracy
People rescuing forgotten knowledge trapped on old floppy disks
bbc.com·6h·
Discuss: Hacker News
📼Cassette Archaeology
Automated Copyright Infringement Detection via Semantic Fingerprinting and Dynamic Thresholding
dev.to·1d·
Discuss: DEV
👁️Perceptual Hashing
The CV-1000 returns, but at what cost?
nicole.express·16h
🕹️Retro Gaming
Two Kinds of "Relicensing"
writing.kemitchell.com·1d·
🌳Archive Merkle Trees
Three ways formally verified code can go wrong in practice
buttondown.com·2h
📜Proof Carrying Code