Newest Stories by tedu
Home
Recent
Comments
Search
Login
16
Apple's amusingly round reuse figures
☶
math
science
blog.jgc.org
via
tedu
2 years ago
|
cached
|
no comments
0
19
Using a Dyson hand dryer is like setting off a viral bomb in a bathroom
☶
science
arstechnica.com
via
tedu
2 years ago
|
cached
|
5 comments
5
13
Every shot Kobe Bryant ever took
☶
visualization
graphics.latimes.com
via
tedu
2 years ago
|
cached
|
10 comments
10
7
GCE Incident 16007
☶
devops
distributed
networking
status.cloud.google.com
via
tedu
2 years ago
|
cached
|
no comments
0
35
Write opinionated workarounds
programming
unix
daemonology.net
via
tedu
2 years ago
|
cached
|
3 comments
3
10
Non-Recursive Make Considered Harmful
☶
pdf
haskell
programming
research.microsoft.com
via
tedu
2 years ago
|
cached
|
4 comments
4
14
If You Can't Break Crypto, Break the Client: Recovery of Plaintext iMessage Data
mac
security
bishopfox.com
via
tedu
2 years ago
|
cached
|
no comments
0
14
How software gets bloated
programming
hackingdistributed.com
via
tedu
2 years ago
|
cached
|
2 comments
2
6
FreeBSD Kernel amd64_set_ldt Heap Overflow
freebsd
security
coresecurity.com
via
tedu
2 years ago
|
cached
|
no comments
0
0
Linode bought old 'Real World' house for new Philly office
☶
practices
technical.ly
via
tedu
2 years ago
|
cached
|
1 comment
1
8
Reviving forgotten science to build the world's most accurate clock
hardware
science
theatlantic.com
via
tedu
2 years ago
|
cached
|
no comments
0
5
The Environmental Toll of a Netflix Binge
☶
devops
hardware
practices
scaling
theatlantic.com
via
tedu
2 years ago
|
cached
|
9 comments
9
12
iOS 9 vulnerability: Content Blockers can track browser history
ios
security
blog.appgrounds.com
via
tedu
2 years ago
|
cached
|
5 comments
5
9
Duplicate Signature Key Selection Attack in Let's Encrypt
☶
math
networking
security
agwa.name
via
tedu
2 years ago
|
cached
|
no comments
0
9
Mobile reddit site perf audit
☶
javascript
visualization
web
github.com
via
tedu
2 years ago
|
cached
|
no comments
0
12
Responsible Disclosure Is Wrong
☶
practices
security
adamcaudill.com
via
tedu
2 years ago
|
cached
|
2 comments
2
7
C preprocessor expressions
☶
c
fanf.livejournal.com
via
tedu
2 years ago
|
cached
|
no comments
0
8
The Curious Tale of MS03-007 (2013)
☶
practices
security
windows
stepto.com
via
tedu
2 years ago
|
cached
|
1 comment
1
3
Experience with the Linotron 202 (1980)
☶
pdf
reversing
cs.princeton.edu
via
tedu
2 years ago
|
cached
|
1 comment
1
15
My Livecoding.tv Account Deletion Saga
culture
practices
liza.io
via
tedu
2 years ago
|
cached
|
no comments
0
6
Crypto Rebels (1993)
☶
law
security
wired.com
via
tedu
2 years ago
|
cached
|
no comments
0
39
Any One Else Using It?
☶
show
release
aoeui.xyz
authored by
tedu
2 years ago
|
cached
|
24 comments
24
11
“Tomato” versus “#FF6347”—the tragicomic history of CSS color names
design
practices
unix
web
arstechnica.com
via
tedu
2 years ago
|
cached
|
no comments
0
18
You can have nice things when the underlying rules change
openbsd
practices
security
unix
marc.info
via
tedu
2 years ago
|
cached
|
2 comments
2
10
Notes on Linux/Xor.DDoS
linux
reversing
security
bartblaze.blogspot.com
via
tedu
2 years ago
|
cached
|
no comments
0
<< Page 4
|
Page 6 >>