Write-Once Media, Legal Compliance, Immutable Archives, Optical Storage

The Supreme Court Casts a Skeptical Eye on Trump’s Tariffs
nytimes.com·23h
📡RSS
Flag this post
Top Control of Q4 2025: Penetration Testing
lmgsecurity.com·5h
🕵️Penetration Testing
Flag this post
WordPress Deep Dive
wiktorjarosz.com·1d·
Discuss: Hacker News
📰RSS Archaeology
Flag this post
Have I Been Pwned adds a billion new passwords to its database
ghacks.net·5h
🔓Password Cracking
Flag this post
10 Smart Performance Hacks For Faster Python Code
blog.jetbrains.com·1d
SIMD Optimization
Flag this post
I’m The Verge’s new AV expert, ask me anything!
theverge.com·7h
💿FLAC Archaeology
Flag this post
How the plastics industry shifted responsibility for recycling onto you, the consumer
phys.org·5h
🧲Magnetic Philosophy
Flag this post
Zama Announces Strategic Acquisition of KKRT Labs to Scale Confidentiality On Public Blockchains
hackernoon.com·1d
🔗Hash Chains
Flag this post
Cyber experts warn of the 'catastrophic' threat quantum computing could pose
9news.com.au·2d·
Discuss: Hacker News
🔐Quantum Security
Flag this post
Improve your digital security with these VPN and antivirus combo deals
techradar.com·1d
🔓Hacking
Flag this post
Preserving Legislative Records: Why they matter and what the Nairobi City County Assembly can teach us
dpconline.org·15h
📋records management
Flag this post
Open Source Talos Linux: Bringing Simplicity to Kubernetes
thenewstack.io·3h
🖥️Self-hosted Infrastructure
Flag this post
The Spegling Chronicles: Measuring dev shadow work until it measured us back
medium.com·8h·
Discuss: Hacker News
📏Code Metrics
Flag this post
27 October 2025 – Inspiring Beginnings: Collaboration, Heritage, and Global Action at ICA Barcelona 2025
ica.org·1d
🏛️PREMIS
Flag this post
Detached agent chains that work like people do
dev.to·23h·
Discuss: DEV
Proof Automation
Flag this post
Elusive Iranian APT Phishes Influential US Policy Wonks
darkreading.com·1d
🌐WARC Forensics
Flag this post
Dissecting my MiniBanners program – part 1
subethasoftware.com·3d
📺VT100
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.org·3d·
Discuss: Hacker News
🌐NetworkProtocols
Flag this post
Show HN: KnexBridge – Generate TypeScript and Zod Types from Knex DB
github.com·11h·
Discuss: Hacker News
🎯Gradual Typing
Flag this post
Weekly Bookmarks
inkdroid.org·4d
🏠Homelab Archaeology
Flag this post