🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏠 Personal Archives

Self-hosting, Privacy, Digital Legacy, Ownership Rights

Palestine Action and the Claim of Right
craigmurray.org.uk·2d
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Backup iCloud Photos and Drive to NAS
parachuteapps.com·3d·
Discuss: Hacker News
📊Differential Backup
Mattel's M.U.S.C.L.E. Men: A Retrospective (2021)
retroramblings.com·2d·
Discuss: Hacker News
🕹️Retro Gaming
The ROI of exercise
nicolaiarocci.com·2d
🗜️Zstandardized Archives
I Can't Worry About the Whole World
candost.blog·1d·
Discuss: Hacker News
⬜Minimalism
Legitimate Chrome VPN extension turns to browser spyware
infosecurity-magazine.com·3d·
Discuss: Hacker News
🕸️WebP Analysis
Put a ring on it: a lock-free MPMC ring buffer
h4x0r.org·1d·
Discuss: Lobsters, Hacker News, Hacker News, r/programming
⚡Hardware Transactional Memory
'I'm the first virtual reality fashion designer'
bbc.com·1d
🏛Digital humanities
WinRAR 0-Day Exploit
dev.to·22h·
Discuss: DEV
💣ZIP Vulnerabilities
FTC has long said products must back up health claims. A MAHA lawsuit would upend that
mercurynews.com·22h
🧲Magnetic Philosophy
Installing Fedora Linux in the Simplest Possible Way
itsfoss.com·1d
🔒Secure Boot
We're doing context engineering wrong
news.ycombinator.com·11h·
Discuss: Hacker News
🌳Incremental Parsing
Social Engineering in Security: Key Threats and Prevention- UK
dev.to·22h·
Discuss: DEV
🛡Cybersecurity
The Coding Agent Metagame
calv.info·1d·
Discuss: Hacker News
🦀Rust Macros
Global warning of Chinese cyberattacks on telecommunications infrastructure
heise.de·3h
🛡Cybersecurity
Troubleshooting EKS with MCP: The Good, the Bad, and the Ugly (plus the Setup)
dev.to·1d·
Discuss: DEV
📦Container Security
how to build a youtube clone with python
dev.to·3d·
Discuss: DEV
🌀Brotli Dictionary
I took a solo honeymoon and loved it. When I got pregnant, I decided to go on a solo babymoon.
businessinsider.com·3d
⭐Awesome lists
Hook Android Trojan Now Delivers Ransomware-Style Attacks
darkreading.com·1d
🔓Hacking
Sense of Self and Time in Borderline Personality. A Comparative Robustness Study with Generative AI
arxiv.org·1d
🧠Intelligence Compression
Loading...Loading more...
AboutBlogChangelogRoadmap