๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›ก๏ธ Preservation Proofs

Formal Archival, Storage Verification, Media Correctness, Durability Logic

More sizzle than steak? Using an LLM to produce verified bug fixes (new preprint)
bertrandmeyer.comยท2d
โšกProof Automation
Internet Archive Designated as a Federal Depository Library
yro.slashdot.orgยท1d
๐ŸŒWeb Archiving
FreeBSD Summer 2025 Roundup: Your Guide to Lock-In Free Infrastructure
klarasystems.comยท3d
๐Ÿ Homelab Preservation
Object deserialization attacks using Ruby's Oj JSON parser
hezmatt.orgยท1dยท
Discuss: Hacker News, Hacker News
๐Ÿ›ก๏ธCBOR Security
Running Serverless WASM Functions on the Edge with K3s and SpinKube
fermyon.comยท2dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
AI-Generated Linux Miner 'Koske' Beats Human Malware
darkreading.comยท1d
๐Ÿ”“Hacking
Teach Yourself Programming in Ten Years
norvig.comยท7hยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
AI coding agents in CI/CD pipelines create new attack vectors
stepsecurity.ioยท3dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
[D] Do you think that Muon Optimizer can be viewed through the lens of explore-exploit?
reddit.comยท20hยท
Discuss: r/MachineLearning
๐Ÿ”ฒLattice Cryptography
Inverted Indexes: A Step-by-Step Implementation Guide
chashnikov.devยท3dยท
Discuss: Hacker News
๐Ÿ”BitFunnel
The Boring AI Questions That Matter
readmargins.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Designing for the different stages of a system's life
exploring-better-ways.bellroy.comยท4dยท
Discuss: Hacker News
๐Ÿ’พPersistence Strategies
Getting Into Flow State with Agentic Coding
kau.shยท3dยท
Discuss: Hacker News
โšกProof Automation
Who Built It? How Proof of Attribution Gives Credit Where Itโ€™s Due?
dev.toยท13hยท
Discuss: DEV
๐Ÿš€Indie Hacking
Does Vibe Coding Produce Adequate Documentation and Code Comments?
dev.toยท12hยท
Discuss: DEV
๐Ÿ”„Language Evolution
AI Revolution & Critical RCEs: A Dev's Digest on GitHub Spark & SharePoint Exploits (23/24-July-2025)
dev.toยท2dยท
Discuss: DEV
๐Ÿ”“Hacking
Computational Performance Bounds Prediction in Quantum Computing with Unstable Noise
arxiv.orgยท3d
โš›๏ธQuantum Compilers
Introducing SRA Verify โ€“ an AWS Security Reference Architecture assessment tool
aws.amazon.comยท4d
๐ŸŒณArchive Merkle Trees
StreamFlow AI - Real-Time ML Pipeline with Redis Streams and Vector Database
dev.toยท15hยท
Discuss: DEV
๐ŸŒŠStream Processing
The Risk in AI Products: Fragmented Enterprise Knowledge
medium.comยท3dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Loading...Loading more...
AboutBlogChangelogRoadmap