Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
bct
.
5
Hostage Situation (on academic papers without code attached)
practices
rant
exple.tive.org
via
bct
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
18
Roy Fielding on “TLS everywhere”
web
plasmasturm.org
via
bct
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
3
Crypto-Santa: use onion routing to anonymize gifts at your Xmas party
networking
security
cryptosanta.xyz
via
bct
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
Timelock: time-release encryption incentivised by Bitcoins
merkle-trees
mail-archive.com
via
bct
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
The secret origin of “log in”
culture
designcult.org
via
bct
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
16
Using Facebook Notes to DDoS any website
security
chr13.com
via
bct
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
12
Alan Kay on computing as pop culture
culture
programmingisterrible.com
via
bct
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
2
Trying out TLS for HTTP:// URLs
networking
security
web
mnot.net
via
bct
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
The past and future web?
web
plasmasturm.org
via
bct
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
How to *actually* use promises in JavaScript
☶
slides
javascript
speakerdeck.com
via
bct
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Transitioning Mozilla Persona to Community Ownership
☶
web
identity.mozilla.com
via
bct
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
1
Hungarian Notation & Security by Anecdote
culture
practices
programmingisterrible.com
via
bct
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
20
Nine Things to Expect from HTTP/2
web
mnot.net
via
bct
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
4
The CMS Trap
design
programming
hakunin.com
via
bct
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Why filesystems have loose-coupling and your protocol doesn't
web
programmingisterrible.com
via
bct
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
How I explained ReST to a Troll
web
programmingisterrible.com
via
bct
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Philosophy and "for" loops (and their design in Go and Rust)
go
rust
lwn.net
via
bct
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Indicating Problems in HTTP APIs
api
web
mnot.net
via
bct
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Bufferbloat Demystified
networking
orospakr.ca
via
bct
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
What We Actually Know About Software Development, and Why We Believe It's True
☶
video
practices
vimeo.com
via
bct
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Mutation testing with Mutant
ruby
solnic.eu
via
bct
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
On the Design of Display Processors (and the nature of progress)
philosophy
programmingisterrible.com
via
bct
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
CRIME: A vulnerability in the SPDY protocol
☶
browsers
security
imperialviolet.org
via
bct
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1