The Internet Archive discovers and captures web pages through many different web crawls.
At any given time several distinct crawls are running, some for months, and some every day or longer.
View the web archive through the Wayback Machine.
Content crawled via the Wayback Machine Live Proxy mostly by the Save Page Now feature on web.archive.org.
Liveweb proxy is a component of Internet Archive’s wayback machine project. The liveweb proxy captures the content of a web page in real time, archives it into a ARC or WARC file and returns the ARC/WARC record back to the wayback machine to process. The recorded ARC/WARC file becomes part of the wayback machine in due course of time.
TIMESTAMPS
The Wayback Machine - https://web.archive.org/web/20180719194744/https://www.trustpds.com/
Personal Data Security - PDS
Software to Fight Identity Theft and Cybercrime
UNBREAKABLE ENCRYPTION
PDS provides unbreakable encryption, relying on AES ciphers and key sizes up to 256 bits. PDS also supports the use of the TDEA and DES ciphers, with the former considered secure and the latter not so since the 1990's (DES is useful for distributing and evaluating PDS). TDEA, in any of its forms, is an extension of DES, and recently (July 2017) the National Institute of Standards and Technology proposed that TDEA be deprecated. Though both AES and TDEA are considered secure today, AES is the clear choice to keep your confidential information secure well into the future.
DATA AVAILABILITY
PDS is written in the Java language, so 1) the same PDS binary runs on Linux/Unix, Mac and Windows Desktop/Laptop computers,* 2) the features, security and quality of each release is equal, and 3) as newer Java runtime environments (JREs) support applications written for older JREs, PDS will run on the JREs of the future. All of this may be verified today by mixing and matching combinations of PDS, OS's and JREs (currently 6, 7, 8, 9 and now 10). So, whether it's Java 10 or 100, PDS will be there for you, making sure your confidential information is always available.
* Note: The demise of Apple's JDK caused a one-time glitch on Mac when Apple libraries were integrated into Java 9.
OPEN SOURCE
For the most part, Java runtime environments (JRE) leverage the open source JRE from OpenJDK, so the complex cryptographic libraries that securely generate the cryptographic components (ciphers, keys and keystores) are open-source. Knowing that cryptographic experts have reviewed these libraries should give all of us some piece of mind.
Generating keys and keystores in Java are boilerplate, and to demonstrate PDS provides the source code for those operations. The remaining area, the creation of ciphers, is not so trivial, so PDS provides the source code for that operation also. PDS verification doesn't stop there, as it also provides 1) runtime verification of the use of the cryptographic objects, to include events such as creating and accessing keystores, keys and ciphers, and 2) a verification each time a password array has been "scrubbed" from memory.
HOW TO FIGHT IDENTITY THEFT AND CYBERCRIME ??
Keep your passwords confidential.
Never reuse your passwords - random passwords are best.