Visualisation of latent finger-marks on brass substrates and ammunition casings
๐ฟOptical Forensics
Flag this post
Digital Forensics Round-Up, October 22 2025
forensicfocus.comยท4d
๐ฌArchive Forensics
Flag this post
How difficult is it to delete a data set โ it can be harder than you think.
colinpaice.blogยท2d
๐บFormat Archaeology
Flag this post
Suspects arrested over the theft of crown jewels from Paris' Louvre museum
the-independent.comยท12h
๐Tape Forensics
Flag this post
Eight Steps to Digital Sovereignty
heise.deยท12h
๐ฅ๏ธSelf-hosted Infrastructure
Flag this post
BeyondTrust PAM โ Secure SSH Access and File Transfers with Password Safe
apple.lib.utah.eduยท2d
๐Archive Encryption
Flag this post
Forensic Video Workflow with Amped FIVE โ Part Three: Reporting and Presentation
blog.ampedsoftware.comยท5d
๐Audio Evidence
Flag this post
An Analysis of iBoot's Image4 Parser
๐Secure Boot
Flag this post
Pinpoint Labs and CloudNine Partner to Simplify and Strengthen eDiscovery Workflows
cloudnine.comยท2d
๐Data Provenance
Flag this post
Eight (or so) Questions to Ask about the ChatGPT Warrant
cyberlaw.stanford.eduยท1d
๐บKerberos Archaeology
Flag this post
CBP will photograph non-citizens entering and exiting the US for its facial recognition database
engadget.comยท3h
๐OCR
Flag this post
An Overview of Digital Tools and Resources for Central and South Asian Studies Reviewed by The DO Members
digitalorientalist.comยท2d
๐Digital Philology
Flag this post
I lost thousands of photos when my phone crashed. Now I print them out for my daughter
bbc.comยท22h
๐ Personal Archiving
Flag this post
Safepay ransomware group claims the hack of professional video surveillance provider Xortec
securityaffairs.comยท5h
๐Hacking
Flag this post
Understanding compliance and conformance in the EAA era
deque.comยท3d
โ๏ธLegal Compliance
Flag this post
The next legal frontier is your face and AI
theverge.comยท10h
๐๏ธLZW Variants
Flag this post
By the power of grayscale!
zserge.comยท22h
๐Fractal Compression
Flag this post
Resilience After the Breach: 6 Cyber Incident Response Best Practices
bitsight.comยท3d
๐จIncident Response
Flag this post
Loading...Loading more...