wiby  
Settings



A Security Curriculum

https://learnaifromscratch.github.io/theabsolutestateofsoftware.html

secure against quantum computers Crypto Protocols in-depth plus Tanja YouTube lectures Engineering Crypto Software how to optimize ChaCha20, Poly1305 and ECDH/Curve25519 If you've

SCUM Manifesto, by Valerie Solanas

http://xahlee.org/p/scum.html

it requires high speed computers to correlate it all. The institution of computers will be delayed interminably under the male control system, since the male has a horror of being

The WWW VL: Educational Technology - Educational VR (MUD) sub-page (05-Jan-2000)

https://tecfa.unige.ch/edu-comp/WWW-VL/eduVR-page.html

Network, is a system of computers in the domain musenet.org providing access to Educational MUSEs (Multi-User Simulated Environments), such as MicroMUSE and MariMUSE. It is based

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2004/

left for home. Unpacked computers onto new table - can actually sit in front of any 1 of 3 concurrently - brilliant. Lunch, played with H. on the BBC cbeebies page; caught Miguel

Gang stalking - Kiwipedia, the free encyclopedia

https://gangstalkingworld.neocities.org/

weapons can be aimed at computers, electrical devices, and persons. They have strong physical and psychological effects and can be used for military and terrorist activities. Thes

Matt Blaze's Exhaustive Search

https://www.mattblaze.org/blog/

targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre

Judicially Arbitrated Imperial E-Democracy

http://www.e-democracy.biz/

www.omniscientcomputers.org for people interested in Science. www.orderofwhiteknights.com For People Who Care A Ton About Basically Only 1 Major Thing Being Wrong In The World. ww
The Constitution of the New World Order. A means for a stable fully customizable E-Democracy and the basis for it’s initial operation.

Cryptography and Liberty 2000

https://archive.epic.org/reports/crypto2000.html/

into buildings or hack computers to obtain encryption keys and obtain information. Law enforcement and intelligence agencies are also demanding and receiving substantial increases

((lambda (x) (create x)) '(knowledge))

https://lambdacreate.com/posts/26

using only their oldest computers. For most this meant something with a gig of ram (which was then software limited down to 1/2gb), and some sort of 2000's CPU on old 5400rpm hdds

Log on With SSH Keys | LandChad.net

https://landchad.net/sshkeys/

of random Chinese computers trying to brute force every server connected to the internet with random passwords. They are usually unsuccessful, but let's make it impossible for the
Let's generate and use SSH keys on our computer. This allows us to ensure our identity better than a password ever could. This allows us to do two main things: Password-less lo

The Story of Mel, A Real Programmer

https://www.icir.org/mallman/mel.html

sounded funny and Real Computers were made out of drums and vacuum tubes, Real Programmers wrote in machine code. Not FORTRAN. Not RATFOR. Not, even, assembly language. Machine Co

Omar Rizwan

https://omar.website/

a fair amount about computers over the last few years, on topics including: wanting provenance everywhere, throughout the computer, whether you're programming or looking at data o


Find more...