Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
mpdehnel
.
15
How Claude Shannon Invented the Future
compsci
historical
quantamagazine.org
via
mpdehnel
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
12
How a one line change decreased our build times by 99%
devops
performance
web
medium.com
via
mpdehnel
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
8
Store SSH keys in the Secure Enclave (macOS)
cryptography
mac
security
swift
github.com
via
mpdehnel
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
33
Being Glue
philosophy
practices
programming
noidea.dog
via
mpdehnel
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
56
How a File Format Led to a Crossword Scandal
video
games
python
youtube.com
via
mpdehnel
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
0
It’s Not Enough to Be Right. You Also Have to Be Kind
education
philosophy
forge.medium.com
via
mpdehnel
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
8
The Seven Properties of Highly Secure Devices
pdf
hardware
security
microsoft.com
via
mpdehnel
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
The Case Against Patents
law
pubs.aeaweb.org
via
mpdehnel
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
6
Protecting customers from the Ticketmaster breach: Monzo's story
finance
law
security
monzo.com
via
mpdehnel
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
Exposing the Secret Office 365 Forensics Tool
law
privacy
security
windows
lmgsecurity.com
via
mpdehnel
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
F*ck Off As A Service (FOAAS)
☶
satire
web
foaas.com
via
mpdehnel
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Noise Explorer: Design and Explore Noise Security Protocol Handshake Patterns
cryptography
formalmethods
security
noiseexplorer.com
via
mpdehnel
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
A catamorphic lambda-calculus interpreter
compilers
compsci
haskell
michaelpj.com
via
mpdehnel
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
23
Making the Touch Bar finally useful
design
mac
practices
vas3k.com
via
mpdehnel
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
3
Open PhD & PostDoc positions in Security and Formal Analysis
☶
cryptography
job
security
cascremers.com
via
mpdehnel
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
23
Authentication vulnerability in most recent 5G drafts, found by formal methods
cryptography
formalmethods
mobile
security
cs.ox.ac.uk
authored by
mpdehnel
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
13
Make SSL boring again
browsers
cryptography
security
blog.cloudflare.com
via
mpdehnel
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
19
Using a logbook to improve your programming
practices
routley.io
via
mpdehnel
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
10 comments
10
85
Dwarf Fortress starting during apt-get upgrade
games
linux
askubuntu.com
via
mpdehnel
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
19 comments
19
12
On Norbert Blum’s claimed proof that P does not equal NP
compsci
math
lucatrevisan.wordpress.com
via
mpdehnel
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
32
Code Health: To Comment or Not to Comment?
programming
testing.googleblog.com
via
mpdehnel
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
37 comments
37