🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏠 Personal Archiving

Digital Legacy, Self-hosting, Privacy Protection, Family History, Individual Curation

Global Call For Papers Now Open: Share Your Knowledge At Magnet User Summit & Magnet Virtual Summit
forensicfocus.com·2d
🔗Data Provenance
Music copyright, how many sucks of the sav?
aardvark.co.nz·2d
🏴‍☠️Piracy
A Brazilian Perspective on Computing for the Planet’s Sustainability
cacm.acm.org·1d
🧊Arctic Storage
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.org·3d·
Discuss: Hacker News
🔐Homomorphic Encryption
Judge Sides with Meta in Key AI Copyright Case
ediscoverytoday.com·1d·
Discuss: Hacker News
⚖️Emulation Ethics
New single-molecule magnet tech could unlock hard drives with 100x more capacity — drives could store three terabytes per square centimeter
tomshardware.com·2d·
Discuss: r/technews
🧲Magnetic Domains
Defining Zero Trust for Bring Your Own Cloud (BYOC)
signoz.io·1d·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Spacelift Adds On-Premises Edition of Infrastructure Management Platform
devops.com·15h
🏠Homelab Orchestration
Networking for Systems Administrators
mwl.io·2d·
Discuss: Hacker News
🌐DNS over QUIC
Show HN: A Ruby gem that generates a secure, unique ID for the current machine
github.com·1d·
Discuss: Hacker News
🔒Secure Boot
Meta Beats Copyright Suit From Authors Over AI Training on Books
tech.slashdot.org·2d
🏷️Metadata Standards
Using Human Stories to Bring Critical Work on AI to the General Public
exposingtheinvisible.org·1h
🧭Content Discovery
Show HN: Clip All King Soopers and Other Kroger Stores' Digital Coupons
github.com·1d·
Discuss: Hacker News
📦Deflate
Structured Logging in NextJS with OpenTelemetry
dev.to·2d·
Discuss: DEV
📝Log Parsing
10 MERN Stack Projects You Should Build
dev.to·6h·
Discuss: DEV
🔃Feed Algorithms
Start here/About Me
dev.to·14h·
Discuss: DEV
📝Concrete Syntax
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750952117902400)
dev.to·1d·
Discuss: DEV
🌐Network Protocols
Secure D365 Like a Pro: Automate Access Requests with Canvas App + Teams Approvals
dev.to·10h·
Discuss: DEV
🔐Capability Systems
ICE Rolls Facial Recognition Tools Out to Officers' Phones
wired.com·27m
🛡Cybersecurity
AI Agents Can Now Pay Autonomously Thanks to x402 and HTTP 402
hackernoon.com·2d
🔌Interface Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap