🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Preservation Proofs

Formal Archival, Storage Verification, Media Correctness, Durability Logic

Sound and Solution-Complete CCBS
arxiv.org·10h
🛡️Archive Verification
Claude Code Gets a Second Opinion from GPT-5
proxymock.io·21m·
Discuss: Hacker News
⚡Proof Automation
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.com·14h
🧪Binary Fuzzing
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·40m
🛡Cybersecurity
Scientists Unlock Quantum Computing Power by Entangling Vibrations in a Single Atom
scitechdaily.com·10h
⚛️Quantum Tape
SurrealDB is sacrificing data durability to make benchmarks look better
blog.cf8.gg·1d·
Discuss: Lobsters, Hacker News, r/programming, r/rust
🦀Rusty Databases
Permacomputing
inkdroid.org·2d
🧲Magnetic Philosophy
7 Steps to Mastering No Code Automation with n8n for Data Professionals
kdnuggets.com·2h
🌊Stream Processing
Song recommendations with F# free monads
blog.ploeh.dk·7h
🔗Functional Compilers
Formal verification effort for the ABDK Math 64.64 library using echidna/hevm
github.com·19m·
Discuss: Hacker News
✅Format Verification
DCP-o-matic • Re: Veriying DCP on Synology NAS via CLI
dcpomatic.com·4h
🛠System administration
IBM x346 server to at home storage
reddit.com·10h·
Discuss: r/homelab
🛠️Greaseweazle
Certificate Transparency - Part 3 - Operations
ipng.ch·1d
🔒Hardware Attestation
Numa Incident Analysis
blog.verichains.io·11h
🌳Archive Merkle Trees
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.com·5h
🔐Quantum Security
From Hashes to Signatures: Securing File Transfers with RSA/ECDSA Digital Signatures
dev.to·3d·
Discuss: DEV
✅Checksum Validation
Capture Checking in Scala
nrinaudo.github.io·9h·
Discuss: Hacker News
🧪Binary Fuzzing
Computer Architecture Lessons from the Kitchen
sigarch.org·40m
🧮Algorithmic Cooking
Radio Apocalypse: America’s Doomsday Rocket Radios
hackaday.com·39m
📼Cassette Technology
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·2h
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap