The Reverse File System: Towards open cost-effective secure WORM storage devices for logging
arxiv.org·16h
💿WORM Storage
Detecting AI Fakes with Compression Artifacts
dmanco.dev·5h·
Discuss: Hacker News
🖼️JPEG Forensics
8 best paper shredders for home use, tried and tested
the-independent.com·3h
🗜️Archive Compression
Lessons from Vibe Coding Three Apps in Three Weeks
backblaze.com·27m
🌀Brotli Internals
Exploring Data Extraction from Android Devices: What Data You Can Access and How
blog.digital-forensics.it·2d·
⚖️Digital Evidence
Huxe: A Personal Intelligence System
huxe.com·2h·
Discuss: Hacker News
🧲Magnetic Domains
Launching Our Free Filename Tool
filenametool.com·1d·
Discuss: Hacker News
🗜️ZIP Forensics
Multi-scale clustering and source separation of InSight mission seismic data
arxiv.org·16h
📡Frequency Archaeology
RelRepair: Enhancing Automated Program Repair by Retrieving Relevant Code
arxiv.org·16h
🔓Decompilation
DNA-Encoded Data Retrieval via Microfluidic Chip-Based Sequencing Optimization
dev.to·14h·
Discuss: DEV
🧬Copy Number Variants
Help finding case/enclosure solutions
reddit.com·5h·
Discuss: r/homelab
🛠️Greaseweazle
Protecting data from the public and ourselves
statmodeling.stat.columbia.edu·1d
⚖️Lossy Compression Ethics
Enter Sandbox 30: Static Analysis gone wrong
hexacorn.com·3d
🔍Binary Forensics
Vesicle-based method sidesteps detergents to reveal proteins in their natural state
phys.org·1h
📄Document Digitization
Scaling Speculative Decoding with Lookahead Reasoning
hao-ai-lab.github.io·1d
🔧Reed-Solomon Decoders
The Point Is Addressing
cacm.acm.org·2h
Hardware Transactional Memory
LongCat-Flash-Thinking, LLM from Meituan (China's Equivalent of Uber Eats)
github.com·12h·
Discuss: Hacker News
🌊Streaming Algorithms
Broken Trust: Fixed Supermicro BMC Bug Gains a New Life in Two New Vulnerabilities
binarly.io·2h
🛡️RISC-V Security
Tips for Working with Legacy Code
esveo.com·1d·
🌿git
How to Keep Using Cursor for FREE on MacOS/Linux 🖥️
dev.to·5h·
Discuss: DEV
🪟Awesome windows command-line