Newest Stories by vyodaiken
Home
Recent
Comments
Search
Login
0
ICE Modified Its 'Risk Assessment' Software So It Automatically Recommends Detention
ai
motherboard.vice.com
via
vyodaiken
1 month ago
|
cached
|
2 comments
2
10
Example of gcc vector optimization BECAUSE of C aliasing
c
godbolt.org
authored by
vyodaiken
2 months ago
|
cached
|
22 comments
22
37
Depressing and faintly terrifying days for the C standard
pdf
c
yodaiken.com
authored by
vyodaiken
2 months ago
|
cached
|
77 comments
77
5
Paxos shaken but not stirred
☶
distributed
yodaiken.com
authored by
vyodaiken
5 months ago
|
cached
|
no comments
0
2
Hack Pack
culture
security
miaminewtimes.com
via
vyodaiken
6 months ago
|
cached
|
no comments
0
4
Why is the clflush instruction unprivileged?
☶
ask
security
authored by
vyodaiken
7 months ago
|
5 comments
5
23
Synchronous processors
☶
hardware
yodaiken.com
authored by
vyodaiken
7 months ago
|
cached
|
4 comments
4
7
“Suspicious” event routes traffic for big-name sites through Russia
networking
security
arstechnica.com
via
vyodaiken
8 months ago
|
cached
|
1 comment
1
14
Alabamian with diabetes built her own artificial pancreas, gives away plan for free
programming
al.com
via
vyodaiken
8 months ago
|
cached
|
4 comments
4
18
No net neutrality in Portugal leads to cable style market segments
☶
law
twitter.com
via
vyodaiken
10 months ago
|
cached
|
2 comments
2
0
APNewsBreak: Georgia election server wiped after suit filed
security
apnews.com
via
vyodaiken
10 months ago
|
cached
|
no comments
0
15
Federal Judge Unseals New York Crime Lab’s Software for Analyzing DNA Evidence —
law
propublica.org
via
vyodaiken
10 months ago
|
cached
|
1 comment
1
10
NTRU Prime post-quantum cryptography and some amazing C code from DJB et al
c
security
ntruprime.cr.yp.to
via
vyodaiken
1 year ago
|
cached
|
no comments
0
2
The Pernicious Science of James Damore’s Google Memo
culture
science
wired.com
via
vyodaiken
1 year ago
|
cached
|
no comments
0
-1
Judges refuse to order fix for court software that put people in jail by mistake
☶
privacy
arstechnica.com
via
vyodaiken
1 year ago
|
cached
|
no comments
0
28
The C standard versus C and the mother of all hacks (more on UB)
☶
c
compilers
yodaiken.com
authored by
vyodaiken
1 year ago
|
cached
|
48 comments
48
30
The C standard committee continues its effort to kill C
☶
c
programming
yodaiken.com
authored by
vyodaiken
1 year ago
|
cached
|
23 comments
23
20
Facebook makes its anti-terrorist workers profiles public by mistake
☶
privacy
security
qz.com
via
vyodaiken
1 year ago
|
cached
|
no comments
0
-1
Will the Georgia Special Election Get Hacked?
☶
security
politico.com
via
vyodaiken
1 year ago
|
cached
|
no comments
0
37
Google Following Your Offline Credit Card Spending To Tell Advertisers If Their Ads Work
privacy
consumerist.com
via
vyodaiken
1 year ago
|
cached
|
25 comments
25
8
After years of warnings, mobile network hackers exploit SS7 flaws to drain bank accounts
security
theregister.co.uk
via
vyodaiken
1 year ago
|
cached
|
2 comments
2
7
Temple Grandin on the kinds of minds science desperately needs
☶
education
science
elsevier.com
via
vyodaiken
1 year ago
|
cached
|
no comments
0
3
Using bluetooth to make credit card skimming more efficient
☶
security
consumerreports.org
via
vyodaiken
1 year ago
|
cached
|
no comments
0
24
Investigation finds inmates built computers and hid them in prison ceiling
education
security
wjla.com
via
vyodaiken
1 year ago
|
cached
|
14 comments
14
10
Defeating AI image recognition
☶
pdf
cogsci
compsci
arxiv.org
via
vyodaiken
1 year ago
|
cached
|
1 comment
1
Page 2 >>