The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท15hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Optimizing Long-Form Clinical Text Generation with Claim-Based Rewards
arxiv.orgยท3h
๐Ÿ“‹Document Grammar
Creating bounding boxes for parish maps in the SLV collection
updates.timsherratt.orgยท2h
๐Ÿ”ถVoronoi Diagrams
Tape Library and Show Off
i.redd.itยท8hยท
Discuss: r/homelab
๐Ÿ“ผCassette Archaeology
One in six adults โ€˜are financial carers helping relatives to manage moneyโ€™
the-independent.comยท8h
๐Ÿ Personal Archiving
New Issue: American Archivist
archivespublishing.comยท4d
๐Ÿ—ƒarchives
An alternative to knowledge graphs for storing loosely structured content
fleetingswallow.comยท16hยท
Discuss: Hacker News
๐Ÿ•ธ๏ธKnowledge Graphs
Nix pills
nixos.orgยท22h
โ„๏ธNixpkgs
Scribd โ€“ A Goldmine of Sensitive Data
medium.comยท1dยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Buy Trusted SSN Numbers for Sale
dev.toยท14hยท
Discuss: DEV
๐Ÿ”Hash Functions
AKF: A modern synthesis framework for building datasets in digital forensics
sciencedirect.comยท1d
๐Ÿ”FLAC Forensics
Are Software Registries Inherently Insecure?
developers.slashdot.orgยท5h
๐Ÿ“ฆContainer Security
Building My Smart 2nd Brain, Part 3: API and UI Explained
dev.toยท19hยท
Discuss: DEV
๐Ÿ”„Archival Workflows
TEIC/Stylesheets
github.comยท2d
๐Ÿ“œTEI Encoding
Inside the Unified Log 4: Log entries
eclecticlight.coยท40m
๐Ÿ“Log Parsing
3 years of DSA: researchers launch "mass enquiry" on Facebook, X & Co.
heise.deยท10h
โš–๏ธLegal Compliance
From the Browser to the Bloodstream
puri.smยท3d
๐Ÿ”—Data Provenance
Canada's 14M Buildings
tech.marksblogg.comยท2dยท
Discuss: Hacker News
๐Ÿ“ŠFormat Entropy
Souvenir
deprogrammaticaipsum.comยท4h
๐Ÿ”ฉSystems Programming