🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
⚖️ Game Preservation Ethics

Cultural Heritage, Access Rights, Emulation Philosophy, Digital Legacy

Verisat – Detecting Satellite Imagery Deepfakes
verisat.ai·7h·
Discuss: Hacker News
👁️OCR Verification
Flookup: The OpenRefine Alternative for Google Sheets Users
getflookup.com·1d·
Discuss: Hacker News
🌐Federated Search
The CoPilot productivity paradox
marginalia.nu·1d·
Discuss: Lobsters, Hacker News, Hacker News
🔄Language Evolution
US college students are questioning value of higher education due to AI
digit.in·4d
🌍Cultural Algorithms
Three Types of People That Hate GPT-5
artificialdebrief.substack.com·15h·
Discuss: Substack
🖥️Terminal Renaissance
Rust for Big Data: How We Built a MPP Query Executor on S3 from Scratch
databend.com·1d·
Discuss: Hacker News
🗄️Database Sharding
AI-powered PromptLocker ransomware is just an NYU research project — the code worked as a typical ransomware, selecting targets, exfiltrating selected data and ...
tomshardware.com·1d
🚀Indie Hacking
Astronauts get a welcome boost from a SpaceX Dragon | On the International Space Station Sept. 1-5, 2025
space.com·1d
🧊Arctic Storage
Historians Found a 600-Year-Old Document Declaring the Shroud of Turin a Fraud
popularmechanics.com·1d
💧Manuscript Watermarks
Live: Resurgent Wallabies back on home soil to take on formidable Argentina
abc.net.au·1d
📋PREMIS Events
X is now offering me end-to-end encrypted chat. You probably shouldn’t trust it yet.
techcrunch.com·1d
🌊Stream Ciphers
Sharing might be caring, but businesses are moving towards private servers
techradar.com·15h
🖥️Self-hosted Infrastructure
Deploying A Dockerized Golang App To AWS App Runner
dev.to·1d·
Discuss: DEV
🔄Sync Engine
Faux Potentiometers Use Magnets, No Contacts
hackaday.com·17h
⚙️DIY Electronics
How to Discover a Website’s Hidden Origin Server
infosecwriteups.com·19h
🛣️BGP Hijacking
AI PCs Set to Dominate by 2029 as Demand Skyrockets
dev.to·9h·
Discuss: DEV
🖥️Terminal Renaissance
The Exit 8 movie is even scarier than the game
theverge.com·1d
🏺Gaming Archaeology
The 'Swiss army knife' of malware emerges - Hook v3 can do ransomware, keylogging, DDoS, screen capture, and far more
techradar.com·2d
🔓Hacking
AI-Driven Dynamic Delivery Route Optimization via Multi-Modal Graph Neural Networks
dev.to·22h·
Discuss: DEV
🌀Riemannian Computing
Why You Need Evals for Your AI Applications
dev.to·3d·
Discuss: DEV
🔍Concolic Testing
Loading...Loading more...
AboutBlogChangelogRoadmap