wiby  
Settings



security-snake-oil

http://linuxmafia.com/faq/Essays/security-snake-oil.html

devoid of security infrastructure (e.g., no privilege levels), I had a theory: "Hey, suppose I tried the strategy of keeping my system upgraded, not running sucky software, dealin

Hygiene for a computing pandemic: separation of VCs and ocaps/zcaps from Christopher Lemmer Webber on 2020-12-05 (public-credentials@w3.org fr

https://lists.w3.org/Archives/Public/public-credentials/2020Dec/0028.html

only >>> one infrastructure. The VC spec with VC schema is sufficiently expressive >>> syntactically to encompass all these semantics we just have to standardize

Tech - Anil Dash

https://www.anildash.com/tags/tech/

best of The lost infrastructure of social media. 08 Aug 2016 blogs search social media tech twitter New York-Style Tech 15 Jul 2016 nyc tech On the Hunt 24 Feb 2016 tech twitter s
A blog about making culture. Since 1999.

Cryptography, crime, terror, and surveillance

https://mohit.uk/git-bin/epq/paper.html

in the hardware and infrastructure that users of the Internet rely on. In the West, a small number of companies (such as Intel, Nvidia, Arm and Apple) design and produce the major

Friden EC-130 Electronic Calculator

https://www.oldcalculatormuseum.com/friden130.html

US government's secret infrastructure. Those who would know details about this work, even to this day, are not forthcoming with information relating to the government projects, so

https://www.ietf.org/rfc/rfc3490.txt

https://www.ietf.org/rfc/rfc3490.txt

changes to the existing infrastructure. IDNA is only meant for processing domain names, not free text. Table of Contents 1. Introduction...........................................

SoylentNews: SoylentNews is people

https://soylentnews.org/

targeted critical infrastructure last year : Three new threat groups began targeting critical infrastructure last year, while a well-known Beijing-backed crew - Volt Typhoon - con

https://www-users.cse.umn.edu/~odlyzko/doc/decline.txt

https://www-users.cse.umn.edu/~odlyzko/doc/decline.txt

where an entire new infrastructure is required, it is often still 15-30 years. Optical amplifiers took around 20 years from concept to deployment. Combinatorial chemistry, which o

Internet Census 2012

https://census2012.sourceforge.net/paper.html

3.3 C&C less Infrastructure A classic botnet usually requires one or more command and control (C&C) servers the clients can connect to. A C&C server comes with several

JB's Place

http://jbschirtzinger.beiteshelpublications.org/

and blows up all of our infrastructure from our good intentions, though, we will have the consolation of saying to ourselves “Yeah, but look how tolerant and diverse we were!” At


Find more...