The Library Method: Understanding @cache
dev.to¡21h¡
Discuss: DEV
⚡Cache Theory
Announcing the 2025 NDSA Excellence Award Winners
ndsa.org¡9h
đŸ›ī¸PREMIS Metadata
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org¡1d¡
Discuss: Hacker News
đŸ›Ąī¸eBPF Security
A disenshittification moment from the land of mass storage
doctorow.medium.com¡10h
🧲Magnetic Philosophy
ACMID: Automatic Curation of Musical Instrument Dataset for 7-Stem Music Source Separation
arxiv.org¡18h
đŸŽĩAudio Formats
High-Quality Video Tape Conversion for Homes and Businesses
forums.anandtech.com¡16h
đŸ“ŧTape Simulation
Building Repo Bench
repoprompt.com¡1d¡
⚡Proof Automation
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com¡12h
💎Information Crystallography
People rescuing forgotten knowledge trapped on old floppy disks
bbc.com¡9h¡
Discuss: Hacker News
đŸ“ŧCassette Archaeology
Welcome to LIL’s Data.gov Archive Search
lil.law.harvard.edu¡2h
💾Data Preservation
Evidence Preservation: Why iPhone Data Can Expire
blog.elcomsoft.com¡1d
đŸŒĄī¸Preservation Entropy
The Day I Hacked XCTrack
blog.syrac.org¡7h¡
Discuss: Hacker News
🔐PKI Archaeology
Ensuring Safe and Reliable Updates with Qualys TruRiskâ„ĸ Manifest Version Control
blog.qualys.com¡1d
✅Archive Fixity
An enough week
blog.mitrichev.ch¡1d¡
🧮Z3 Solver
Linux SBCs for development + RE
zetier.com¡1d
đŸŽ¯Emulator Accuracy
Running new applications on old glibc
lightofdawn.org¡1d¡
Discuss: Hacker News
🔗Static Linking
Automated Copyright Infringement Detection via Semantic Fingerprinting and Dynamic Thresholding
dev.to¡1d¡
Discuss: DEV
đŸ‘ī¸Perceptual Hashing
Three ways formally verified code can go wrong in practice
buttondown.com¡5h
📜Proof Carrying Code
The Legacy Code Survival Guide: Add Features Without Fear
understandlegacycode.com¡3d
🔓Decompilation
The CV-1000 returns, but at what cost?
nicole.express¡19h
đŸ•šī¸Retro Gaming