Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
idiot-bird
.
1
Curating Dependency Vulnerabilities
security
beny23.github.io
via
idiot-bird
6 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
security
securephones.io
via
idiot-bird
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Q&A: Neil Thompson on computing power and innovation
☶
compsci
news.mit.edu
via
idiot-bird
11 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
17
How Bad Is QWERTY, Really? A Review of the Literature, such as It Is
culture
erichgrunewald.com
via
idiot-bird
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Buying Data and the Fourth Amendment
☶
pdf
law
privacy
hoover.org
via
idiot-bird
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
On the Optimal Time/Space Tradeoff for Hash Tables
pdf
performance
programming
arxiv.org
via
idiot-bird
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Policy prop-132 (AS0 for unallocated space) deployed in service
networking
blog.apnic.net
via
idiot-bird
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
CNIT 141: 1. Cryptography
video
cryptography
youtube.com
via
idiot-bird
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
13
Voice calls in LTE
cryptography
security
blog.cryptographyengineering.com
via
idiot-bird
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1