Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π‘οΈ Digital Preservation
OAIS Model, Migration Strategies, Emulation, Bit Rot
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
28867
posts in
59.8
ms
digital
forensics
β
torrent
file analysis for windows!
medium.com
Β·
2h
π¬
Archive Forensics
Paranoid
Qrypto
β’: Offline Air-gapped Encrypted QR Code Backup for Crypto,
Mnemonic
phrase, Keys & Secrets Secure Password Manager
paranoidqrypto.com
Β·
1h
Β·
Discuss:
Hacker News
π
Archive Encryption
Stochastic
Kernel-Switching
Error Diffusion
blog.kaetemi.be
Β·
14h
π
Digital Signal Processing
NSHEDB
: Noise-Sensitive
Homomorphic
Encrypted Database Query Engine
arxiv.org
Β·
23h
π
Homomorphic Encryption
Home
verapdf.org
Β·
1d
ποΈ
OAIS Implementation
EUscreen
Symposium 2026 β
Reframing
Openness: Empowering Authenticity and Reuse in Audiovisual Heritage
ace-film.eu
Β·
14h
πΊ
Media Archaeology
Identity
drift
rhollick.wordpress.com
Β·
13h
π―
Gradual Typing
HΓΈiland-JΓΈrgensen
: The inner workings of TCP zero-copy
lwn.net
Β·
8h
π‘
Network Protocol Design
Thank
You for Your Service: On the
Obsolescence
of Open Source
malus.sh
Β·
10h
Β·
Discuss:
Hacker News
π
Open Source Software
An AI Odyssey, Part 1:
Correctness
Conundrum
johndcook.com
Β·
1h
π§
Hardware Verification
Optimizing
Recommendation Systems with
JDK
βs Vector API
netflixtechblog.com
Β·
2h
β‘
SIMD Vectorization
APT37
combines cloud storage and USB implants to
infiltrate
air-gapped systems
securityaffairs.com
Β·
15h
π
Operating system internals
Peeling Off the Cocoon: Unveiling Suppressed Golden Seeds for
Mutational
Greybox
Fuzzing
arxiv.org
Β·
23h
π§ͺ
Binary Fuzzing
Valuable
News
vermaden.wordpress.com
Β·
11h
π
Operating system internals
Show HN:
Aver
β A Git-native Markdown-based tracker for knowledge
setwardship
github.com
Β·
1d
Β·
Discuss:
Hacker News
β±οΈ
Interval Archives
Object
permanence
doctorow.medium.com
Β·
19h
π‘οΈ
Preservation Logic
Building a risk-based data
sanitization
strategy: When to use
Cryptographic
erasure vs. physical destruction
cybersecuritydive.com
Β·
18h
π‘οΈ
Preservation Proofs
Will AI
Obviate
All Software?
seekingalpha.com
Β·
10h
π€
AI Curation
The
Math
Behind the Match: Building Production Search for People
Names
hackernoon.com
Β·
8h
π³
Trie Structures
A vision of
computing
in the near future
terracrypt.net
Β·
1d
π
Homelab Archaeology
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help