wiby  
Settings



Reflections on YouTube - YouTube - Computers, Technology, and Internet - lolwut?

http://www.lolwut.info/comp/youtube/youtube-reflections.html

also tweaked their algorithms for both the search bar results and the list of related videos, in both cases preferring monetized (and often clickbait) videos over non-monetized on
My experiences with and thoughts on YouTube.

Debian Disguised Work

http://disguised.work/

weak GSS - API exchange algorithms . I’m looking forward to being able to split out GSS - API key exchange support in OpenSSH once Ubuntu 26.04 LTS has been released! This stuff w

Ciphers By Ritter: Cryptography and Technology

http://ciphersbyritter.com/

access? Combiner-Type Algorithms (1998) Comments on codebook and combiner algorithms. The Homophonic Block Cipher Construction (1998) (213K) A discussion of noise in plaintext, ho
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.

Avoiding "The Botnet" - impossible?

http://digdeeper.love/articles/botnet.xhtml

in the encryption algorithms or any one of the devices that are used for the meshnet. Again, our enemies have bigger resources / influence than us. Therefore, even decentralizatio

https://www.cs.mcgill.ca/~rdemori/

https://www.cs.mcgill.ca/~rdemori/

of Speech Using Fuzzy Algorithms Plenum Press, NY, 1983.   ASR research evolved with application of statistical methods described in selected publications describing attempts

Becoming physically immune to brute-force attacks - Seirdy

https://seirdy.one/posts/2021/01/12/password-strength/

algorithms, so I won’t; this is just a pure and simple brute-force attack given precomputed password entropy, assuming that the cryptography is bulletproof. Obviously, I’m not tak
Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.


Find more...