🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏺 Protocol Archaeology

Historical Standards, Legacy Formats, Communication Evolution, Digital Heritage

An engineer’s path from data loss to software preservation
softwareheritage.org·17h
🔄Archival Workflows
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.be·6h
📡Bluetooth Archaeology
How One 1990s Browser Decision Created Big Tech’s Data Monopolies (And How We Might Finally Fix It)
techdirt.com·1h
🧲Magnetic Philosophy
SMPTE Unveils Content Provenance and Authenticity in Media Study Group
smpte.org·6h
⏱️SMPTE Timecode
Parsing Protobuf Like Never Before
mcyoung.xyz·12h
🔧Binary Parsers
Looking for Daybooks in the Archives
flickr.org·4h
🌳B-tree Archaeology
Kiro and the future of AI spec-driven software development
kiro.dev·5h·
Discuss: Lobsters, Hacker News
🔌Interface Evolution
🔐 Introducing EMCL – A Secure Protocol for AI Agents to Call Tools
dev.to·1d·
Discuss: DEV
🌐NetworkProtocols
Triggering QUIC
potaroo.net·1d
🌐DNS over QUIC
How Standard Setters Run the Internet
internetsociety.org·1d
🌐Web Standards
The internet still runs on 1980s protocols – that should worry you
techradar.com·1d
📡BGP Archaeology
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.com·5h
🔓Password Cracking
Know Your Playground: The Essential Guide to Algorand for MEV Enthusiasts
hackernoon.com·1d
🔗Hash Chains
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.org·3d
🌐DNS Security
Introducing TCP-in-UDP solution (eBPF)
blog.mptcp.dev·1d·
Discuss: Lobsters, Hacker News
🌐Network Protocols
From National to Virtual: A Brief History of The Gallery
library.soton.ac.uk·9h
🏛Digital humanities
Musings of a Trust Architect: When Technical Standards Meet Geopolitical Reality
lifewithalacrity.com·1d
🤝Distributed Consensus
Federated instant messaging, 100% debianized
blog.trueelena.org·1d
🔌Interface Evolution
Checking data integrity
eclecticlight.co·13h
✅Checksum Validation
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·19h·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
Loading...Loading more...
AboutBlogChangelogRoadmap