๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›ก๏ธ ZFS Checksums

Data Integrity, Scrubbing, Silent Corruption Detection, Block Verification

Podcast Episode 85: AI and Authoritarianism
blog.vasi.liยท1d
๐Ÿ“ฐRSS Archaeology
IT Security Weekend Catch Up โ€“ August 1, 2025
badcyber.comยท5d
๐Ÿ”“Hacking
Rapid PCB Prototyping with KiCad and a CNC Router
peterprototypes.comยท2dยท
Discuss: Hacker News
โš™๏ธDIY Electronics
Show HN: I developed the logging, notification back end for your app
notifylog.comยท23hยท
Discuss: Hacker News
๐Ÿ“ฐFeed Readers
What Is Parrot?
hexdocs.pmยท3dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
No Backdoors. No Kill Switches. No Spyware.
blogs.nvidia.comยท1dยท
Discuss: Hacker News, r/hardware
๐Ÿ–ฅ๏ธModern Terminals
As the last cloud giant: Amazon launches new VMware service
heise.deยท1d
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
ElevenLabs launches its own royalty-free AI music service
engadget.comยท1d
๐ŸŽงLearned Audio
What I Learned From Downloading My Poshmark Data (and Where to Find Yours)
lifehacker.comยท1d
๐Ÿ”—Data Provenance
AppArmor For Linux 6.17 Set To Introduce AF_UNIX Mediation, Other Improvements
phoronix.comยท3dยท
Discuss: r/linux
๐Ÿ”ŒOperating system internals
How I Set Up a Cowrie Honeypot to Capture Real SSH Attacks
hackernoon.comยท6d
๐Ÿ“ŸTerminal Forensics
Following the USDAโ€™s food and farm funding
grist.orgยท1d
๐Ÿ“ฐFeed Readers
Apple has just released updates to XProtect and XProtect Remediator
eclecticlight.coยท1d
๐Ÿ”ŒOperating system internals
Surveillance: Law enforcement agencies are once again using more state trojans
heise.deยท1d
๐ŸŒWARC Forensics
GPT OSS models from OpenAI are now available on SageMaker JumpStart
aws.amazon.comยท1d
๐Ÿ”“Open Source Software
Your Protection Guide For Cybersecurity in Manufacturing
heimdalsecurity.comยท22h
๐Ÿ›กCybersecurity
Topolow: Force-Directed Euclidean Embedding of Dissimilarity Data with Robustness Against Non-Metricity and Sparsity
arxiv.orgยท2d
๐ŸŒComputational Topology
A Comparative Study of Optimal Control and Neural Networks in Asteroid Rendezvous Mission Analysis
arxiv.orgยท1d
๐ŸŒ€Differential Geometry
Risky Bulletin: China with the accusations again
news.risky.bizยท3d
๐Ÿ”“Hacking
Physics-Informed Data-Driven Control of Nonlinear Polynomial Systems with Noisy Data
arxiv.orgยท2d
๐Ÿ›ก๏ธError Boundaries
Loading...Loading more...
AboutBlogChangelogRoadmap