Reflections on YouTube - YouTube - Computers, Technology, and Internet - lolwut?http://www.lolwut.info/comp/youtube/youtube-reflections.html
also tweaked their algorithms for both the search bar results and the list of related videos, in both cases preferring monetized (and often clickbait) videos over non-monetized on
My experiences with and thoughts on YouTube.
Debian Disguised Workhttp://disguised.work/
weak GSS - API exchange algorithms . I’m looking forward to being able to split out GSS - API key exchange support in OpenSSH once Ubuntu 26.04 LTS has been released! This stuff w
Ciphers By Ritter: Cryptography and Technologyhttp://ciphersbyritter.com/
access? Combiner-Type Algorithms (1998) Comments on codebook and combiner algorithms. The Homophonic Block Cipher Construction (1998) (213K) A discussion of noise in plaintext, ho
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.
Avoiding "The Botnet" - impossible?http://digdeeper.love/articles/botnet.xhtml
in the encryption algorithms or any one of the devices that are used for the meshnet. Again, our enemies have bigger resources / influence than us. Therefore, even decentralizatio
https://www.cs.mcgill.ca/~rdemori/https://www.cs.mcgill.ca/~rdemori/
of Speech Using Fuzzy Algorithms Plenum Press, NY, 1983. ASR research evolved with application of statistical methods described in selected publications describing attempts
Becoming physically immune to brute-force attacks - Seirdyhttps://seirdy.one/posts/2021/01/12/password-strength/
algorithms, so I won’t; this is just a pure and simple brute-force attack given precomputed password entropy, assuming that the cryptography is bulletproof. Obviously, I’m not tak
Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.
Find more...