Link log versions
• <https://dotat.at/:/>
• landing pages
• Atom feed
• Dreamwidth links
• LiveJournal links
My other activity
• Dreamwidth blog
• work blog
• Twitter
everything
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
<<
2013
>>
- 2013-12-31: About Python 3 (lack of) adoption.
- 2013-12-31: Where will we live? The British housing crisis.
- 2013-12-30: Xplain: explaining X11 for the rest of us.
- 2013-12-30: Hacking MicroSD cards.
- 2013-12-29: On geek culture.
- 2013-12-29: Nine lies about fat that ruined the western world's health.
- 2013-12-29: Scientists tell us their favourite jokes: 'An electron and a positron walked into a bar…'
- 2013-12-29: Viral sharing and truth in journalism.
- 2013-12-28: Quantities: type-safe units of measurement for Idris.
- 2013-12-28: C# for systems programming.
- 2013-12-28: Analysis of SSD reliability during power outages.
- 2013-12-28: Imperative reasoning is hard.
- 2013-12-28: MailChimp CEO on email's age defying resilience.
- 2013-12-27: Replicant: distributed state machines made easy.
- 2013-12-27: 10 of the best open source hardware projects of 2013.
- 2013-12-26: Joose: an advanced metaclass system for JavaScript.
- 2013-12-26: Advanced design patterns in Python.
- 2013-12-26: Cheques are in decline, but UK gov't says “We want cheques to have a crucial role in the ongoing success of the UK.”
- 2013-12-26: Albrecht Dürer's Roman letters.
- 2013-12-25: Implementing Elligator for Curve25519.
- 2013-12-25: So, you want to crypto...
- 2013-12-24: Why is Git HTTPS not working on GitHub?
- 2013-12-24: Strong TLS security on nginx (and Apache and lighttpd).
- 2013-12-24: Gitlab and Active Directory LDAP authentication.
- 2013-12-24: Mobile ISP image recompression.
- 2013-12-24: PNG can be a lossy format.
- 2013-12-24: 10 best and most memorable maker projects of 2013.
- 2013-12-24: Cameron's internet filter goes far beyond porn - and that was always the plan.
- 2013-12-23: The mathematical hacker.
- 2013-12-23: Adam Rosenberg's programming style.
- 2013-12-23: Perl 6 unary sort.
- 2013-12-23: A local augmented root zone with DNSSEC.
- 2013-12-23: Copyright is not stealing, says the Supreme Court of the US.
- 2013-12-23: The beauty of mathematics. (Vimeo)
- 2013-12-23: Take charge of your batteries!
- 2013-12-22: Railgun: fast strstr() implementation.
- 2013-12-22: Why marketers fear the female geek.
- 2013-12-22: UPS's holiday shipping planner: they call him Mr Peak.
- 2013-12-22: Former Top NSA official: "we are now in a police state".
- 2013-12-22: Brand contamination: when men's products get girl cooties.
- 2013-12-22: Algorithmic defamation: the case of the shameless autocomplete.
- 2013-12-21: Growing up unvaccinated.
- 2013-12-21: How to search on encrypted data.
- 2013-12-21: Who in Whitehall approved torture after 9/11?
- 2013-12-21: New openssh key format and bcrypt pbkdf.
- 2013-12-20: NSA/RSA DUAL_EC_DRBG arrangement was known in September.
- 2013-12-20: Sierpiński calendar.
- 2013-12-20: NSA paid RSA $10 million to promote backdoored DUAL_EC_DRBG.
- 2013-12-20: Critics say NSA agent co-chairing key crypto standards body should be removed.
- 2013-12-20: Canada lifts all restrictions on prostitution, because they increase harm.
- 2013-12-20: Requesting removal of NSA employee from chair of IETF crypto forum research group.
- 2013-12-20: UPS My Choice has amazingly creepy security questions and bait-and-switch pricing.
- 2013-12-20: On the matter of strlcpy/strlcat acceptance by industry.
- 2013-12-20: 0x10 years of protecting privacy with GnuPG.
- 2013-12-20: When is a 'cluster' a real cluster? Cyclist deaths in London.
- 2013-12-20: 'Free trade' and the death of democracy.
- 2013-12-20: UK porn block fiasco goes mainstream.
- 2013-12-20: 100 years of monopoly phone service.
- 2013-12-20: The inventor of Karaoke.
- 2013-12-20: "I wrote the Anarchist Cookbook in 1969. Now I see its premise as flawed."
- 2013-12-20: Flaw in OpenSSL Dual EC DRBG (no not that one).
- 2013-12-20: Winkel Tripel warping trouble.
- 2013-12-19: Nutrient: an indexed key-value store based on crit-bit tries with a cdb-like API.
- 2013-12-19: Golang 1.3+ compiler overhaul: The Go compiler today is written in C. It is time to move to Go.
- 2013-12-19: Bitcoin, magical thinking, and political ideology.
- 2013-12-19: Why WordPress bloggers were blocked by TalkTalk, and what it tells us about Internet filtering.
- 2013-12-18: MacBook webcams can spy on their users without warning.
- 2013-12-18: One Weird Old Trick to Undermine the Patriarchy.
- 2013-12-18: RSA key extraction via low-bandwidth acoustic cryptanalysis.
- 2013-12-18: The magazine that featured in War Games.
- 2013-12-18: Why I want Bitcoin to die in a fire.
- 2013-12-18: We are allowed to hate Silicon Valley.
- 2013-12-18: Common markup for Markdown and reStructuredText.
- 2013-12-17: UK Internet archive will not be accessible via the Internet, because copyright.
- 2013-12-17: It's the Macroeconomy, Stupid. Neoliberal policy targets the structure not the level of wealth.
- 2013-12-17: We need to talk about TED.
- 2013-12-17: git-integration: easily merge several work-in-progress topic branches onto a base branch.
- 2013-12-16: Recommendations for secure use of TLS and DTLS.
- 2013-12-16: Fast blitting on the 6809.
- 2013-12-15: So you think you have a power law - well, isn't that special?
- 2013-12-15: It's not harming anyone, so why is Brussels trying to remove my e-cigarette?
- 2013-12-15: On undoing, fixing, or removing commits in git.
- 2013-12-15: The web needs view object containment.
- 2013-12-15: The mission to decentralize the Internet.
- 2013-12-15: The basics of taking good photos.
- 2013-12-14: Bugs in the wetware? The psychology of computer insecurity.
- 2013-12-13: Bicycle Helmets and the law: a perfect teaching case for epidemiology.
- 2013-12-13: A vintage cargo bike collection in Italy.
- 2013-12-13: The drop in teenage pregnancies is a great political success story.
- 2013-12-13: Cap'n Proto: promise pipelining RPC protocol.
- 2013-12-12: Simple Binary Encoding: a new ultra-fast marshalling API in C++, Java and .NET.
- 2013-12-12: lazysorted: a partially and lazily sorted list data structure for Python.
- 2013-12-12: Better and better keyboard prototypes.
- 2013-12-12: Running a web browser on a Macintosh Plus.
- 2013-12-11: The birth of stderr.
- 2013-12-11: Obscure C++ features.
- 2013-12-10: Doom at 20: John Carmack's hellspawn changed gaming forever.
- 2013-12-10: NSA ♥ Facebook.
- 2013-12-10: Samantha West: the telemarketer robot who swears she's not a robot.
- 2013-12-10: Doom: 20 years of a gaming legend.
- 2013-12-10: Maria Leijerstam's South Pole trike.
- 2013-12-09: Why are Upworthy headlines suddenly everywhere?
- 2013-12-09: Exile: disassembly of the most technically advanced game released for the BBC Micro.
- 2013-12-08: There are now two Americas. The country is a horror show.
- 2013-12-08: talloc: The Tutorial.
- 2013-12-07: Still waiting for the stupid network.
- 2013-12-07: Ten lazy assumptions that are part of the mainstream political consensus.
- 2013-12-07: WHAT THE FLUCK! The point at which journalism fails and modern power begins.
- 2013-12-06: Telepathwords: preventing weak passwords by reading your mind.
- 2013-12-06: Clocks: a collection of experiments in generative art.
- 2013-12-06: reptyr: change the pty of a running process on Linux.
- 2013-12-06: Multiprocess Firefox.
- 2013-12-05: Edward Snowden and Glenn Greenwald: the people who leaked the NSA's secrets.
- 2013-12-05: King James programming: a Markov chain trained on the bible and Structure and Interpretation of Computer Programs.
- 2013-12-05: Gmail download and escape hatch.
- 2013-12-04: Dispute over infinity divides mathematics.
- 2013-12-03: Greenwald: the journalist who hacked the old system.
- 2013-12-03: The SSD endurance experiment: testing data retention at 300TB.
- 2013-12-03: Project Oberon 2013: the design of an operating system, a compiler, and a computer.
- 2013-12-03: How does the NSA break SSL?
- 2013-12-03: A young person's guide to BCPL programming on the Raspberry Pi.
- 2013-12-03: NSA werewolf.
- 2013-12-03: Applied crypto hardening.
- 2013-12-02: The return of the open mail relays.
- 2013-12-02: A linguist explains the rules of summoning Benedict Cumberbatch.
- 2013-12-02: Headlines from a mathematically literate world.
- 2013-12-01: Most important innovations are not patented.
- 2013-12-01: Bedsheet Problem: how many times can you fold it in half?
- 2013-12-01: CC0 vs CC-BY.
- 2013-12-01: TPM chip protecting SSH keys, properly.
- 2013-12-01: Comedian gets the last laugh over FCUK logo row.
- 2013-11-30: Reverse-engineering Vermeer's secret technique.
- 2013-11-30: The Jolla phone: first impressions.
- 2013-11-30: Myth: Apollo astronauts didn't float away because they had heavy boots.
- 2013-11-30: San Francisco's DC power grid.
- 2013-11-30: OK to clone software by testing it and reading the manual, rules UK court.
- 2013-11-29: Cheaper IPv6-only servers.
- 2013-11-28: Configure BIND to validate answers to recursive queries in zones for which it is authoritative.
- 2013-11-28: Root zone KSK rollover. (slides)
- 2013-11-28: SSAC advisory on DNSSEC key rollover in the root zone. (slides)
- 2013-11-28: SSAC advisory on DNSSEC key rollover in the root zone.
- 2013-11-28: Computer science course fills seats at Harvard.
- 2013-11-27: Algorave is the future of dance music (if you're a nerd).
- 2013-11-27: Linux memory management and linear big data scans.
- 2013-11-27: Trends in cybersecurity.
- 2013-11-27: Pre-paid SIM cards for travellers.
- 2013-11-27: Comcast now has the world's largest IPv6 deployment.
- 2013-11-27: Farming hard drives: 2 years and $1M later.
- 2013-11-27: The Google+ real names policy has had an amazing effect on the quality of YouTube comments.
- 2013-11-27: Tradeoffs in cybersecurity.
- 2013-11-26: FFTS: fastest fourier transform in the south.
- 2013-11-26: NTP amplification attacks.
- 2013-11-26: Mail supremacy: The newspaper that rules Britain.
- 2013-11-26: Jury decides that Newegg infringes the bogus TQP crypto patent.
- 2013-11-26: Creative Commons licences version 4.0.
- 2013-11-25: The dot, our simplest punctuation mark, has become a sign of anger.
- 2013-11-25: Healthcare.gov and the gulf between planning and reality.
- 2013-11-25: Unresolvable host names in the Alexa top 1,000,000 web site list.
- 2013-11-25: A simple explanation of how money moves around the banking system.
- 2013-11-25: Whitfield Diffie takes the stand in the Newegg crypto patent troll trial.
- 2013-11-25: NDK quartz crystal manufacturing plant exploded, killing someone 200 metres away.
- 2013-11-25: ICANN kills Scott Richter's spam-friendly registrar Dynamic Dolphin.
- 2013-11-24: Northwestern Lightboard, for recording lecture graphics without lots of post-production.
- 2013-11-24: Boolean satisfiability: from theoretical hardness to practical success.
- 2013-11-23: Teach debugging by playing the sabotage game.
- 2013-11-23: Fixing Walmart's node.js memory leak.
- 2013-11-23: Breaking OS X signed kernel extensions with a NOP.
- 2013-11-23: The long-gone tax that everyone still thinks they're paying.
- 2013-11-23: Geeks for monarchy: the rise of the neoreactionaries.
- 2013-11-23: 555 footstool.
- 2013-11-23: Circuit stickers.
- 2013-11-23: Information Is Beautiful awards 2013 winners.
- 2013-11-22: Fixing fsync().
- 2013-11-22: Louis Essen on the history of leap seconds. (1981)
- 2013-11-21: Microsoft are selling a Google mug.
- 2013-11-21: To kill a centrifuge: a technical analysis of what Stuxnet's creators tried to achieve.
- 2013-11-21: Leonardo da Vinci's viola organista cello/piano cross has at last been built 500 years after it was designed.
- 2013-11-21: Mathematicians team up on twin primes conjecture.
- 2013-11-20: Software patent reform just died thanks to lobbying from IBM and Microsoft.
- 2013-11-20: Halting password puzzles: hard-to-break encryption from human-memorable keys.
- 2013-11-20: Nominet will go ahead and flatten the .uk DNS namespace.
- 2013-11-20: Cycling and trucks the Dutch way.
- 2013-11-19: Rosetta stone for Unix.
- 2013-11-19: JSTOR denies access to five people every second.
- 2013-11-19: A new diagnostic test to distinguish benign and life-threatening prostate cancers. #movember
- 2013-11-19: Zalgol: an esoteric programming language.
- 2013-11-19: Visual cryptography.
- 2013-11-18: Analysis of the https X.509 certificate ecosystem.
- 2013-11-18: The forgotten giant arrows that guided the mail across America.
- 2013-11-17: What mathematical structure models arithmetic with physical units?
- 2013-11-17: An efficient non-moving garbage collector for functional languages.
- 2013-11-17: ‘Because' has become a preposition, because grammar.
- 2013-11-17: Why is it so difficult and expensive to make your own clothes?
- 2013-11-17: What has gone wrong with RNGs in practice.
- 2013-11-17: The dsfjdssdfsd list provides a venue for discussion of randomness in IETF protocols.
- 2013-11-17: Acid Retirement Home: 20 years of cultural stagnation.
- 2013-11-16: The two dualities of computation: negative and fractional types.
- 2013-11-16: Lorries, cyclists, and delivery restrictions in Paris.
- 2013-11-16: A 2x speedup with one line of code: prefetching Python objects during array traversal.
- 2013-11-15: What happens to Google Maps when tectonic plates move?
- 2013-11-15: Afnic promotes .fr DNSSEC.
- 2013-11-15: Robust de-anonymization of large datasets: how to break anonymity of the Netflix prize dataset.
- 2013-11-15: What happens when a GPRS terminal attaches to the network.
- 2013-11-15: Detecting stealthy distributed ssh brute force attackers.
- 2013-11-15: Should quadrotors look like this?
- 2013-11-15: How a journalist faced his fears and learned to be good at maths.
- 2013-11-15: With Great Power. (A superhero short story.)
- 2013-11-14: CrunchBase's contradictory Creative Commons copyright case.
- 2013-11-14: Terra: a low-level system programming language embedded in Lua.
- 2013-11-14: dataset: databases for lazy Python programmers.
- 2013-11-14: The second operating system hiding in every mobile phone.
- 2013-11-14: Police try to recuit a student to spy on political activity at Cambridge University.
- 2013-11-14: Integer undefined behaviour in open source crypto libraries.
- 2013-11-13: Snowden and the future.
- 2013-11-13: Vi Hart on Google+ YouTube integration.
- 2013-11-13: The secret life of SIM cards.
- 2013-11-13: 40% more of what salary balances happiness against a long commute?
- 2013-11-13: Bechdel gets testy.
- 2013-11-12: Our privacy problem is a democracy problem in disguise.
- 2013-11-11: Web latency benchmark.
- 2013-11-11: Weak statistical standards implicated in scientific irreproducibility: p should be 0.005 or less.
- 2013-11-11: The Dr Who theme as Ron Grainer may have intended.
- 2013-11-11: The big data brain drain: science is in trouble.
- 2013-11-11: A person with a one-hour commute has to earn 40% more to be as happy as someone who walks.
- 2013-11-10: Why do Brits accept surveillance?
- 2013-11-10: A short history of software development methods.
- 2013-11-10: Psychedelics and mental health: a population study.
- 2013-11-10: Why the Cornell paper on selfish Bitcoin mining is important.
- 2013-11-10: The Pyret programming language.
- 2013-11-09: Evaluation of New Zealand's bicycle helmet law: compulsory helmets increase risk of injury by 20-30%.
- 2013-11-09: Rotate the world with JavaScript D3.
- 2013-11-08: Google shell style guide.
- 2013-11-07: Geography of top-level domains.
- 2013-11-07: Bitcoin isn't so broken after all.
- 2013-11-07: Bootstrapping the adoption of Internet security protocols.
- 2013-11-06: Who's the biggest spy? NSA, GCHQ, and the "special relationship".
- 2013-11-06: Mozilla anticookie tool plans crumbling.
- 2013-11-06: The best and worst countries to be an expatriate.
- 2013-11-06: Part of Internet Archive building badly burned in early morning fire.
- 2013-11-06: Statistics done wrong: the woefully complete guide.
- 2013-11-05: DiffPDF: compare two PDF files, textually or visually.
- 2013-11-05: Undefined behaviour: what happened to my code?
- 2013-11-04: Bitcoin is fundamentally broken.
- 2013-11-04: 25th anniversary of the Morris worm.
- 2013-11-03: Best visual illusion of the year contest, 2005-present.
- 2013-11-03: Browsing history: A heritage site is being set up in the UCLA room where the first ARPANET message originated.
- 2013-11-03: The highly unusual company behind Sriracha, the world's coolest hot sauce.
- 2013-11-02: An interview with the old man of floating point.
- 2013-11-02: Unii, a student-only social network, signs up 100,000+ users in six months in the UK.
- 2013-11-02: Google's plans for a 1-million-square-foot London office at King's Cross.
- 2013-11-02: Ditch Microsoft Office or take a pay cut: Which would you choose?
- 2013-11-02: A devil's dictionary of programming.
- 2013-11-02: Neo900: open phone project.
- 2013-11-01: Patent war goes nuclear: Rockstar sues Google with ex-Nortel patents.
- 2013-11-01: The 2008 Liberty vs UK case: an ECHR ruling on Snowden's disclosures.
- 2013-11-01: Bitcoin as protocol.
- 2013-10-30: Announcing the Dark Mail Alliance, founded by Silent Circle and Lavabit.
- 2013-10-30: Lavabit and Silent Circle join forces to make all email surveillance-proof.
- 2013-10-30: Toyota's killer firmware: Bad design and its consequences.
- 2013-10-30: Why are "Ghost," "Ghastly," and "Ghoul" Spelled with "gh"?
- 2013-10-29: The status of Moore's Law: it's complicated.
- 2013-10-29: Seagate comedic open storage.
- 2013-10-28: Diebold charged with bribery and falsifying docs in a worldwide pattern of criminal conduct.
- 2013-10-28: C in CAP != C in ACID.
- 2013-10-28: Phishing with Linkedin's Intro.
- 2013-10-27: The keys to the keydom: RSA keys with common factors.
- 2013-10-27: The war on hackers.
- 2013-10-27: The e-cigarette industry, waiting to exhale.
- 2013-10-27: Making 128MB SIMMs from 64MB SIMMs.
- 2013-10-27: Data Cube: a relational aggregation operator generalizing group-by, cross-tab, and sub-total.
- 2013-10-27: How to write New Age Jargon.
- 2013-10-27: Mac OS 10.9: infinity times your spam.
- 2013-10-26: I challenged hackers to investigate me and what they found out is chilling.
- 2013-10-26: The Netherlands: a whole country that has transformed itself for cycling.
- 2013-10-26: Schrödinger's token: parsing with multiple-typed tokens.
- 2013-10-26: What's new in Unicode 7.0.
- 2013-10-26: What it would take for self-driving cars to catch on.
- 2013-10-26: Lua: Good, different, and ugly parts.
- 2013-10-26: The Slash programming language.
- 2013-10-26: Delayed printf for real-time logging.
- 2013-10-25: LinkedIn Intro? No thanks. My email security is too important.
- 2013-10-25: A quick audit of CryptoCat's elliptic curve crypto.
- 2013-10-25: LinkedIn 'Intro'duces email man-in-the-middle attack on its users.
- 2013-10-25: Reinventing storage: ethernet über alles!
- 2013-10-25: Optimizing TLS record size and buffering latency.
- 2013-10-25: A relatively easy to understand primer on elliptic curve cryptography.
- 2013-10-25: NASD: network-attached secure disks.
- 2013-10-25: The Seagate Kinetic open storage vision.
- 2013-10-24: OS X Mavericks ruined Apple Mail for Gmail users.
- 2013-10-23: Security fixes in OS X Mavericks v10.9.
- 2013-10-23: Trace and replay retrospective debugging?
- 2013-10-23: Curl: a note to users of OS X Mavericks 10.9.
- 2013-10-23: Color blindness and palette choice.
- 2013-10-23: Edit the HTML of sites that insist on binary gendered titles.
- 2013-10-23: Gerrit code review: Change-IDs.
- 2013-10-22: Regenerator: Let's get serious about ES6 generator functions.
- 2013-10-22: Tubewhacking.
- 2013-10-22: The decline of Wikipedia: as more people rely on it, fewer people create it.
- 2013-10-22: Raspberry Pi GPS NTP without soldering.
- 2013-10-22: Maps of average cloud coverage.
- 2013-10-22: How to lose $172,222 a second for 45 minutes.
- 2013-10-21: The roots of the US government shutdown.
- 2013-10-21: Why civil resistance works: the strategic logic of nonviolent conflict.
- 2013-10-21: TP-Link TL-WR703N: an extremely small networked computer.
- 2013-10-21: Is math a gift? Beliefs that put females at risk.
- 2013-10-21: Everything you always wanted to know about synchronization but were afraid to ask.
- 2013-10-21: Six decades of the USA's most popular names for girls, state-by-state.
- 2013-10-21: The invention of switch mode power supplies.
- 2013-10-20: 13 nutrition lies that made the world sick and fat.
- 2013-10-20: A few Utah panoramas.
- 2013-10-20: Anti-racism campaigner and immigration caseworker sent 'go home' text message by Home Office.
- 2013-10-20: Graph of Radiohead songs by genre.
- 2013-10-20: Dianne Feinstein's bragging about NSA surveillance program may lead to I t being declared unconstitutional.
- 2013-10-20: Every position of Rubik's Cube can be solved in twenty moves or less.
- 2013-10-20: Sweden becomes first western nation to reject low-fat dogma in favor of low-carb high-fat nutrition.
- 2013-10-20: Showing you this map of aggregated bullfrog occurrences would be illegal.
- 2013-10-20: Engineering the LOUDS succinct tree representation.
- 2013-10-20: Analysis of Apple iMessage privacy.
- 2013-10-20: 4 reasons clang is becoming my go-to compiler.
- 2013-10-20: The ocean is broken.
- 2013-10-20: Six weeks to provision a VM?!?
- 2013-10-17: Recovering a corrupted git packfile.
- 2013-10-17: Your brain on beer vs coffee.
- 2013-10-16: Is Bitcoin an NSA honeypot?
- 2013-10-15: Bollocks cycling infrastructure.
- 2013-10-15: The Cambridge CAP capability-based computer.
- 2013-10-15: The BCS computer conservation society.
- 2013-10-15: Stained glass sundials.
- 2013-10-15: Land unknown to humans before the European age of discovery.
- 2013-10-14: GCHQ hid its network spying capability from parliamentary snoopers charter scrutiny.
- 2013-10-14: A diary of four wars: where war reporting goes wrong.
- 2013-10-14: How to design a city for women.
- 2013-10-14: A review of the Avegant Virtual Retinal Display.
- 2013-10-14: Time to leave leap seconds behind?
- 2013-10-14: A cylindrical cut-glass sundial.
- 2013-10-14: SafeCurves: choosing safe curves for elliptic-curve cryptography.
- 2013-10-14: The trouble with timestamps in distributed databases.
- 2013-10-14: Proofs as Cryptography: a new interpretation of Curry-Howard for software certificates.
- 2013-10-13: Unemployment is not a sign of bad character.
- 2013-10-13: Cambridge bike theft conviction rate barely above 1%.
- 2013-10-13: Property in London is like a global reserve currency.
- 2013-10-13: Labour will be more right wing than the Tories.
- 2013-10-13: Reverse engineering a D-Link backdoor.
- 2013-10-13: The US fears back-doored hardware because they are building it too.
- 2013-10-12: Why email is hard: internationalization.
- 2013-10-12: The awful body-shaming future of 3D printing.
- 2013-10-12: Microsoft Word must die.
- 2013-10-12: The registrars who obeyed City of London police demands to disable web sites likely violated ICANN policy.
- 2013-10-11: The London Ringways: a post-war plan for a dense network of motorways through and around the capital.
- 2013-10-11: European ruling spells trouble for unmoderated online comment.
- 2013-10-10: evldns: libevent + ldns.
- 2013-10-10: "What happened to me after I read dinosaur erotica."
- 2013-10-10: The 9 kinds of physics seminar.
- 2013-10-09: Chelsea Manning: I'm no "pacifist".
- 2013-10-09: 802.11ac 'gigabit Wi-Fi' starts to show its potential and limits.
- 2013-10-09: Name That Blue.
- 2013-10-09: Commodore Pet killer poke.
- 2013-10-09: Why and how Ben Goldacre wrote Bad Pharma.
- 2013-10-09: The Great Library at Alexandria was destroyed by budget cuts, not fire.
- 2013-10-09: The Financial Times switches to a digital-first publishing model.
- 2013-10-09: Constructing the Sierpinsky triangle.
- 2013-10-09: The bogus Starbucks duffin trademark is provoking cake rage.
- 2013-10-08: Shards: How the high-wizard Mordaine invented NoSQL.
- 2013-10-08: An informal anti-virus comparison.
- 2013-10-08: Optimizing Linux memory management for low-latency / high-throughput databases.
- 2013-10-08: Lossless decompression and the generation of random samples.
- 2013-10-08: Intellectual Ventures buys patent donated by AmEx for the public good... and starts suing.
- 2013-10-08: How the FBI forced Lavabit to shut down.
- 2013-10-08: BioLite fan-assisted wood stove and generator with USB power out.
- 2013-10-08: GADT meet subtyping.
- 2013-10-07: Tea Party radicalism is misunderstood: meet the "newest right".
- 2013-10-07: A profile of Alan Rusbridger and the Guardian in the New Yorker.
- 2013-10-07: Grandma's cooking from around the world.
- 2013-10-07: How (not) to trigger a layout in WebKit.
- 2013-10-07: Preventing web page layout thrashing.
- 2013-10-06: nedtries.
- 2013-10-06: ZeroMQ: helping OpenDNS block malicious domains in real time.
- 2013-10-06: The coming world of automated mass anti-terror false positives.
- 2013-10-06: Dogs are people too.
- 2013-10-06: Luje: a pure Lua JVM.
- 2013-10-06: The shutdown prophet: maybe Washington was destined to go dark all along.
- 2013-10-06: A scientific guide to saying "no": How to avoid temptation and distraction.
- 2013-10-06: A federal budget crisis months in the planning.
- 2013-10-06: Coffee experiments.
- 2013-10-05: Maven is broken by design.
- 2013-10-05: 1m2 space-saving staircase from EeStairs.
- 2013-10-04: And then Steve said, ‘let there be an iPhone'.
- 2013-10-04: Patent troll Lodsys settles for nothing to avoid trial.
- 2013-10-04: "RFCs were just a temporary expedient intended to last just a few months."
- 2013-10-04: Guillermo del Toro's Simpsons couch gag is the best thing ever. (video)
- 2013-10-03: extprot: compact, efficient, extensible, binary, cross-language, long-term serialization protocols.
- 2013-10-03: Visualizing suffix primes.
- 2013-10-03: Silk Road, Lavabit, and the limits of crypto.
- 2013-10-02: Edward Snowden's email provider defied FBI demands to turn over private crypto keys.
- 2013-10-02: The hallmark of a truly effective internal security system would be the maximum possible disclosure.
- 2013-10-02: Cockblocked by redistribution: a pick-up artist fails in Denmark.
- 2013-10-02: Bathys Hawaii Cesium 133 atomic wristwatch.
- 2013-10-02: Kardashev scale of levels of civilization. Type III is about 4E37 W.
- 2013-10-02: The Death Star used 1E38 joules to destroy Alderaan.
- 2013-10-01: Write build rules in Lua with tup.
- 2013-10-01: What will the completed Sagrada Família look like? (YouTube)
- 2013-10-01: Efficient custom allocators in C.
- 2013-10-01: Food verbiage that should be banned.
- 2013-09-30: Why whistleblowers should be listened to.
- 2013-09-30: Responsive web design tips from BBC News.
- 2013-09-30: Steal this research paper! (You already paid for it.) Michael Eisen and open access publishing.
- 2013-09-29: Judge tosses Apple motion, allows patent troll Lodsys to continue rampage.
- 2013-09-29: ARM64 and Objective C.
- 2013-09-29: Topological rope trick.
- 2013-09-29: Knight v Snail in medieval manuscripts.
- 2013-09-29: Why mathematicians make great comedy writers.
- 2013-09-29: US nuclear commander suspended for gambling problems.
- 2013-09-28: Internet centralization is not a conspiracy.
- 2013-09-27: Edward Snowden has started a global debate. So why the silence in Britain?
- 2013-09-27: FastMail staff purchase the business from Opera.
- 2013-09-25: Preparing an IPv6 addressing plan.
- 2013-09-25: The Seven Lady Godivas: Dr. Seuss's little-known book of nudes.
- 2013-09-25: Make a Minecraft map of Britain with 230 lines of Python.
- 2013-09-25: Norway: tobacco harm reduction in the real world.
- 2013-09-25: Zab vs. Paxos: distributed consensus in ZooKeeper.
- 2013-09-25: Normal vs fat-tailed distributions.
- 2013-09-25: How does Dutch street design work for pedestrians?
- 2013-09-24: Availability in globally distributed storage systems: Google's failure stats.
- 2013-09-24: Name server selection of DNS caching resolvers. (slides)
- 2013-09-24: Authority selection in DNS caching resolvers.
- 2013-09-24: iodine: IPv4 over DNS.
- 2013-09-24: US DHS DNS security reference architecture.
- 2013-09-24: Could you pass a Dutch cycling exam?
- 2013-09-24: Stateless TCP for higher DNS capacity on FreeBSD.
- 2013-09-24: LPEG tutorial.
- 2013-09-24: A brief introduction to LPEG.
- 2013-09-24: Job offer: user admin database manager for the University of Cambridge Computing Service.
- 2013-09-24: A Minecraft map of Great Britain from the Ordnance Survey.
- 2013-09-24: Hacking around with Reading Borough Council's urban traffic management and real-time passenger information infrastructure.
- 2013-09-23: The myth of the 10x programmer.
- 2013-09-22: IRIX alert sounds for iOS.
- 2013-09-22: The 500 highest bridges.
- 2013-09-22: Chaos Computer Club breaks Apple TouchID.
- 2013-09-22: Weird machines in ELF: the RTLD is Turing complete.
- 2013-09-22: Percussive Maintenance. (Vimeo)
- 2013-09-22: Hardened stateless session cookies.
- 2013-09-22: Carpet designer threatens cosplayers with legal action.
- 2013-09-21: iOS 7 includes support for Multipath TCP.
- 2013-09-21: Edward C++Hands.
- 2013-09-21: Git internals.
- 2013-09-21: SecurID: security through obscurity.
- 2013-09-21: iPhone 5s: basic fingerprint replication fails to defeat TouchID sensor.
- 2013-09-20: Frog's knickers: a review of "Holy Shit: A Brief History of Swearing".
- 2013-09-19: Time to tame the NSA behemoth trampling our rights.
- 2013-09-19: The cltq story: undefined behaviour in code that seems to use only unsigned integers.
- 2013-09-18: The d-left CBF has the same functionality as a counting Bloom filter, but generally uses half the space or less.
- 2013-09-18: How Tim O'Reilly failed.
- 2013-09-18: CEO who sold Doubleclick to Google replies to patent troll with racketeering lawsuit.
- 2013-09-18: Cryptography for the paranoid.
- 2013-09-18: A jewel at the heart of quantum physics.
- 2013-09-17: Cryptography coding standard.
- 2013-09-17: Getting real about distributed system reliability.
- 2013-09-17: CDC report links use of antibiotics as livestock growth enhancer to human deaths.
- 2013-09-17: Not the morphine: the size of the cage! Rat Park upturns conventional wisdom on addiction.
- 2013-09-17: Updated SSL/TLS deployment best practices deprecate RC4.
- 2013-09-16: Ronn: markdown to manpage converter.
- 2013-09-16: The bizarre evolution of the word "cyber".
- 2013-09-16: The banality of systemic evil.
- 2013-09-16: DNSSEC validation for the PowerDNS Recursor.
- 2013-09-16: SmartFacts: factorizing crypto keys created by certified secure smart cards.
- 2013-09-16: NSA performs active MITM attacks.
- 2013-09-16: The Republican plot to kill Obamacare.
- 2013-09-16: Towards representing APL in Haskell.
- 2013-09-16: Betrayal of the Internet imaginaire.
- 2013-09-15: Good SSL server configuration is absurdly difficult in practice.
- 2013-09-14: The Cambridge Tab has improved student journalism.
- 2013-09-14: Things you should NEVER say during presentations.
- 2013-09-14: Mac OS X security configuration guides.
- 2013-09-14: Photos from the roof above King's Cross Station.
- 2013-09-14: The ugliest C feature: tgmath.h
- 2013-09-14: The Feynman lectures on physics.
- 2013-09-14: Four options for reopening Varsity train line from Cambridge to Bedford revealed by Railfuture.
- 2013-09-13: Solaris random number generation.
- 2013-09-13: Stealthy dopant-level hardware trojans: malicious chips resistant to microscopic inspection.
- 2013-09-13: The Hornsleth deep storage project is deeply, darkly, weird.
- 2013-09-13: Software engineering: a great discipline for an academic fraudster.
- 2013-09-13: Ray Dolby, 1933-2013.
- 2013-09-12: It takes a village to save a hard drive.
- 2013-09-12: Battle Mountain world human-powered speed challenge 2013.
- 2013-09-12: Graeme Obree is aiming for 100mph on his "Beastie" at Battle Mountain this week.
- 2013-09-12: History and implementation status of Opportunistic Encryption for IPsec.
- 2013-09-12: Cambridge Teslathon, 26th/27th October 2013.
- 2013-09-12: Defeating ebook DRM with a Kindle, an iSight, and Lego Mindstorms.
- 2013-09-11: ZooKeeper vs. Doozer vs. Etcd.
- 2013-09-11: (Intellectual) Property is Theft!
- 2013-09-11: Gems mined from NSA documents and FISA court opinions.
- 2013-09-11: The NSA machine: Too big for anyone to understand.
- 2013-09-11: NSA: still bound by laws of computational complexity.
- 2013-09-11: x86 oddities.
- 2013-09-10: Bring back monad comprehensions.
- 2013-09-10: How to fake fingerprints.
- 2013-09-10: Polymer banknotes coming to the UK in 2016.
- 2013-09-10: Superlinear indexes research project.
- 2013-09-10: The TokuFS streaming file system.
- 2013-09-10: Tokutek fractal tree indexing overview.
- 2013-09-10: Hoxton Street Monster Supplies.
- 2013-09-10: Counting to four billion really fast.
- 2013-09-10: Fake storefronts in New York. (The Brooklyn Superhero Supply Company is super cool.)
- 2013-09-10: The real NSA tradeoff: quality of governance.
- 2013-09-09: Understanding the robustness of SSDs under power fault.
- 2013-09-09: Code archaeology with Git.
- 2013-09-09: How the cult of shareholder value wrecked American business.
- 2013-09-09: Nothing up my sleeve number.
- 2013-09-09: A guide to branching in Mercurial.
- 2013-09-09: An in-depth analysis of Mercurial and Git branches.
- 2013-09-09: git-remote-gcrypt: gpg-encrypted git remote storage.
- 2013-09-09: NSA intelligence coup: terrorist suspects use pizza shops.
- 2013-09-09: Authenticated encryption: encrypt-and-MAC vs encrypt-then-MAC vs MAC-then-encrypt.
- 2013-09-09: ReDS: a framework for reputation-enhanced distributed hash tables.
- 2013-09-09: Problems with IPSEC crypto. (1995)
- 2013-09-08: On the British press's lack of interest in the NSA/GCHQ scandal.
- 2013-09-08: National Service Bill. The 1950s called: they want their policies back.
- 2013-09-08: Smoothies and fruit juices are a risk to health.
- 2013-09-08: Dubstep: the musical.
- 2013-09-08: Harvard Business School case study: gender equity.
- 2013-09-08: Obama administration had restrictions on NSA reversed in 2011.
- 2013-09-08: NSA can spy on all kinds of smart phones.
- 2013-09-07: Global jellyfish populations appear to fluctuate on a decadal basis.
- 2013-09-07: 90% of Tor keys can be broken by the NSA.
- 2013-09-07: Jellyfish are taking over!
- 2013-09-07: UK government plans to take money from the working poor.
- 2013-09-07: Sweden sits on pipeline of communications intelligence 'gold'.
- 2013-09-07: 1Password and the crypto wars.
- 2013-09-07: A brief history of unusual punctuation marks.
- 2013-09-07: Speculation on NSA activity in IPSEC standardization.
- 2013-09-07: NSA access is built into Windows.
- 2013-09-06: Certified lies: detecting and defeating government interception attacks against SSL.
- 2013-09-06: A path forward for an LLVM toolchain on Windows.
- 2013-09-06: What if an attacker tampers with /etc/ssh/moduli?
- 2013-09-06: How CMU increased the proportion of women in computer science from 7% to 42%.
- 2013-09-06: Nginx is taking over the Internet.
- 2013-09-06: Toys R Us pledges to stop gender specific product marketing.
- 2013-09-06: BeeLine reader: colour gradients help eyes track lines more easily.
- 2013-09-06: The public interest argument for publishing the NSA decryption story.
- 2013-09-06: Matt Green on the NSA.
- 2013-09-06: Security dangers of NIST elliptic curves.
- 2013-09-06: Cambridge parkour POV. (YouTube)
- 2013-09-06: Did the NSA put a backdoor in new crypto RNG standard?
- 2013-09-06: Cambridge UKIP candidate Hugh Mennie fined for forging election signatures.
- 2013-09-06: How advanced is the NSA's cryptanalysis, and can we resist it?
- 2013-09-06: How to remain secure against NSA surveillance.
- 2013-09-06: Bias in computer systems.
- 2013-09-06: Technological due process.
- 2013-09-06: Welcome to human rights: make yourself uncomfortable. Internet freedom and humanitarian aid.
- 2013-09-05: NSA and GCHQ defeat crypto and security on the internet.
- 2013-09-05: Train toilets of the world.
- 2013-09-05: 1000 Americans try to name a British city other than London.
- 2013-09-05: The baby and the Ba'ath water: US interference in Syria in the 1940s.
- 2013-09-04: DNS cache poisoning: new vulnerabilities and implications.
- 2013-09-04: DNS UDP fragmentation considered poisonous.
- 2013-09-04: Don't run a Tor router and a hidden service from the same connection!
- 2013-09-04: Bridge over troubled bolts: safety concerns about new Bay Bridge.
- 2013-09-04: Soviet cable cars above a Georgian mining town.
- 2013-09-03: Microsoft plus Nokia: Pending patent troll?
- 2013-09-03: Trying for academic tenure without publishing.
- 2013-09-03: The patent troll crisis is really a software patent crisis.
- 2013-09-03: Sealand is planning Havenco 2.0.
- 2013-09-02: Google Play Services: the closed-source meta-app that is defragging Android.
- 2013-09-02: Generators vs fibers in node.js: statically marked vs unmarked coroutines.
- 2013-09-02: On compiling 34 year old C code.
- 2013-09-02: Wikipedia decides to disregard Manning's change of name.
- 2013-09-02: How to choose colours procedurally.
- 2013-09-02: The Leaky Establishment: nuclear comedy ebook.
- 2013-09-02: Offender tagging: electronic curfew in the UK.
- 2013-09-02: Syria: climate change, drought and social unrest.
- 2013-09-01: One-legged man accused of benefit fraud after officials examine wrong leg.
- 2013-09-01: Indiana man accused of teaching people to beat lie detector tests faces prison.
- 2013-09-01: Who has more info: Guantánamo defense lawyers or Hollywood?
- 2013-08-31: Build cycling infrastructure like Livingston!
- 2013-08-31: What happens when someone takes on US consumer protection regulators.
- 2013-08-31: MOV is Turing complete.
- 2013-08-31: A properly untranslatable word: 爽
- 2013-08-31: Ballmer: The man who got the Innovator's Dilemma too much.
- 2013-08-31: The US GAO on the problems with software patents.
- 2013-08-31: The sovereign double-standard: US power and interventionism.
- 2013-08-31: All 9,866,539 buildings in the Netherlands, shaded according to year of construction.
- 2013-08-31: After patent loss, Apple tweaks FaceTime to route all calls via their servers.
- 2013-08-31: Reversing Sinclair's amazing 1974 single chip scientific calculator.
- 2013-08-31: How much does HFT latency arbitrage take from other traders?
- 2013-08-31: California's foie gras ban is upheld by appeals court.
- 2013-08-31: CoffeeScript is 4 times more concise than C.
- 2013-08-30: High school journalists successfully test shield law In cyberbullying suicide case.
- 2013-08-30: How to make your own halloumi.
- 2013-08-30: The active badge location system. (1992)
- 2013-08-30: Guided busway legal battle with BAM Nuttall settled by Cambridgeshire County Council.
- 2013-08-30: Success for LGBT+ campaign, as Cambridge University drops gendered dress codes.
- 2013-08-30: UK government may develop new chemical weapon for use on protesters.
- 2013-08-29: Spy Kids: the NSA and the end of jobs for life.
- 2013-08-29: The strange death of the British middle class.
- 2013-08-28: London to Brighton by train, in 1953, 1983, and 2013.
- 2013-08-28: SQLite's next-generation query planner.
- 2013-08-28: Looking inside the Dropbox client: reverse engineering and security analysis.
- 2013-08-28: Dang ol' babies!
- 2013-08-28: Gallery of multiprocessor cache effects.
- 2013-08-27: The CODE keyboard. (Pity about the typography.)
- 2013-08-27: 8 questions to ask before you automate.
- 2013-08-27: Spoof geolocation with a rogue WiFi AP.
- 2013-08-27: Necessary and proportionate surveillance?
- 2013-08-27: Righting the ship on US higher education costs.
- 2013-08-27: GitHub featured in the New Yorker.
- 2013-08-27: The Bristol bus boycott that led to the race relations acts.
- 2013-08-27: Cryptobox: a crypto API modelled on DJB's NaCl using NIST ciphers.
- 2013-08-27: How might the feds have snooped on Lavabit?
- 2013-08-27: Wireless mesh networks will save us from censorship.
- 2013-08-26: High resolution photographs and 3D models of British fossils.
- 2013-08-26: Wireless mesh networks won't save us from censorship.
- 2013-08-26: The spooks' aim: To make journalism harder, slower, less secure.
- 2013-08-26: How Snowden did it.
- 2013-08-26: Mind the gap: London Underground station platform gaps.
- 2013-08-26: Security Debianisms.
- 2013-08-26: Accidentally Turing-Complete.
- 2013-08-26: Lessons learned from mistakes made scaling Reddit to 1 billion pageviews a month.
- 2013-08-26: Phone hack can block calls and SMS on GSM networks.
- 2013-08-26: The greatest mystery of the Inca Empire was its strange economy.
- 2013-08-26: ostree: atomic upgrade and rollback for Linux systems.
- 2013-08-26: The Posix filesystem API sucks.
- 2013-08-26: Comparing U.S. vs world covers of TIME magazine.
- 2013-08-26: State of innovation: Busting the private-sector myth.
- 2013-08-26: The best map ever made of America's racial segregation.
- 2013-08-26: Write-optimized B-trees.
- 2013-08-26: The Science of Cycology: can you draw a bicycle?
- 2013-08-26: When authorities confiscate your electronics they will install malware before returning them.
- 2013-08-26: Fewer accidents in Oxford after speed limits reduced to 20mph.
- 2013-08-26: Mesh networking approaches the mainstream.
- 2013-08-26: olsrd: an adhoc wireless mesh routing daemon.
- 2013-08-26: Comparing AODV and OLSR mesh routing protocols.
- 2013-08-26: Economic reductionism stops here.
- 2013-08-26: Declassified CIA files prove America helped Saddam target chemical weapons against Iran.
- 2013-08-26: Pregnancy: the hard facts.
- 2013-08-26: Use two-factor authentication for Mozilla Persona on your own domain.
- 2013-08-25: Net into dire muck (an anagram of Nominet Direct UK).
- 2013-08-25: A third party report on the open .uk 2LD proposal.
- 2013-08-25: Nimrod: a statically typed language with macros and message-passing concurrency.
- 2013-08-25: Idea: git push requests.
- 2013-08-25: Boilerplate for autotools-based C project.
- 2013-08-25: The seven deadly sins of distributed systems.
- 2013-08-25: 1980s horror movie poster logos and typography.
- 2013-08-24: Met police refusing to co-operate with IPCC investigation into abuse of border interrogation powers.
- 2013-08-24: Closing TCP connections is unreliable.
- 2013-08-24: The Lib Dems used to keep us honest. Not any more.
- 2013-08-24: Somebody's listening: Duncan Campbell's report on Echelon. (1988)
- 2013-08-24: How the government finally ruins 3D printing.
- 2013-08-24: Banned hallucinogen ibogaine could cure heroin addiction.
- 2013-08-24: What Manning revealed.
- 2013-08-24: Parsing C++ is undecidable.
- 2013-08-24: C++ and the culture of complexity.
- 2013-08-24: CoVim: collaborative editing for vim.
- 2013-08-23: CloudFlare's new WAF: compiling to Lua.
- 2013-08-23: Two cheers for GitHub.
- 2013-08-23: Divisibility rules for hex.
- 2013-08-23: The obesity epidemic started around 1980.
- 2013-08-23: UK government now leaking documents about itself.
- 2013-08-23: UK's secret Mid-East internet surveillance base.
- 2013-08-23: How biased is the BBC?
- 2013-08-23: Soldering is Easy: here's how to do it.
- 2013-08-23: SMT soldering: it's easier than you think!
- 2013-08-23: Another Sokal takedown: the number 2.9013 will go down in the history of bad science.
- 2013-08-23: The confidential memo at the heart of the global financial crisis.
- 2013-08-23: How computers took over trading.
- 2013-08-23: How to make perfect coffee.
- 2013-08-23: The silent power of the NSA. (1983)
- 2013-08-23: Chelsea Manning: on pressing the button.
- 2013-08-23: NSA domestic spying: Mathematicians should speak out.
- 2013-08-22: Authentication flaws in the Tesla Model S REST API.
- 2013-08-22: Why do so many incompetent men become leaders?
- 2013-08-22: The real, terrifying reason why the British authorities detained David Miranda.
- 2013-08-22: SourceForge making money from malware installers.
- 2013-08-22: Forward secrecy for asynchronous messaging.
- 2013-08-22: OpenSSL PRNG is not really fork-safe.
- 2013-08-22: nanomsg: an improved ØMQ.
- 2013-08-22: Social Engineering: security through education.
- 2013-08-22: Deterministic builds for Tor: why? Cyberwar and global compromise.
- 2013-08-22: CIA closes office that declassifies historical materials.
- 2013-08-22: DHS lawyer says travelers need not submit to TSA VIPR searches.
- 2013-08-22: UK government considers banning tiny mobile phones.
- 2013-08-22: Real spies got shorter sentences than Bradley Manning.
- 2013-08-22: A PHP implementation written in PHP.
- 2013-08-21: The algebra of Unix shell history substitution.
- 2013-08-21: A week with Mozilla Rust.
- 2013-08-21: Painted rainbow nails are too gay for the Olympics.
- 2013-08-21: US intelligence on the record.
- 2013-08-21: Surveillance, censorship, and secrecy - Pacific island style.
- 2013-08-21: Volkan the Intruder: one-man underpants party in Merkel's jet.
- 2013-08-21: The whistleblower's mad moral courage.
- 2013-08-21: 2011 FISA court opinion ruling some NSA surveillance unconstitutional.
- 2013-08-21: The only way to avoid the US invention secrecy act is to forgo patent protection.
- 2013-08-21: Containers and Docker: how secure are they?
- 2013-08-21: Does the Cabinet Secretary think democracy is a frivolous game?
- 2013-08-21: Pixarific Rim.
- 2013-08-21: Four fears for authoritarians.
- 2013-08-21: August 2013 GNU Toolchain update.
- 2013-08-21: The key to happiness? love something to the point of ridicule.
- 2013-08-21: Surveillance, totalitarianism and botched up causality.
- 2013-08-21: Bradley Manning's sentence: 35 years for exposing us to the truth.
- 2013-08-21: Zircon affair: UK government secrecy vs journalism in the 1980s.
- 2013-08-21: NSA taps 75% of Internet traffic in the USA.
- 2013-08-21: An astronaut nearly drowned in space.
- 2013-08-21: The 5-in-1 network admin's cable.
- 2013-08-21: The great App.net mistake.
- 2013-08-21: DNS reflection attacks, and measuring resolver support for DNS over TCP.
- 2013-08-20: NSA documents released to the public since June 2013.
- 2013-08-20: What the spooks know. (2005)
- 2013-08-20: Count the women. Count the people of color.
- 2013-08-20: Heuristics and rules: why CloudFlare built a new old WAF.
- 2013-08-20: Louise Mensch provides a right wing view of Snowden / Greenwald / Miranda.
- 2013-08-20: Mac OS X hardening tips from the NSA.
- 2013-08-20: Getopt::Declare: generate command line parsers for Perl programs from their usage documentation.
- 2013-08-20: genparse: command line parser generator.
- 2013-08-20: docopt: generate a command-line argument parser from your usage documentation.
- 2013-08-20: Patent trolls: Tracking down the litigious invention owners.
- 2013-08-20: Groklaw shuts down due to pervasive surveillance.
- 2013-08-20: John le Carré: the spies who lost it.
- 2013-08-20: John le Carré: "I was a secret even to myself."
- 2013-08-20: Bradley Manning and the two Americas.
- 2013-08-20: UK defence authority notice system: quasi-unofficial press censorship.
- 2013-08-20: US government prosecuting instructors of polygraph-beating methods.
- 2013-08-19: What did the US government ask Lavabit to do?
- 2013-08-19: Research software engineers have no recognised career path within universities.
- 2013-08-19: Srelipmoc in esruoc tsrif a.
- 2013-08-19: The danger that reporters now face: GCHQ think destroying laptops in London will stop Snowden's stories.
- 2013-08-19: New features in JavaScript / ECMAScript 6.
- 2013-08-19: David Miranda detention at Heathrow and schedule 7 of the Terrorism Act.
- 2013-08-19: Google claims it is not subject to UK privacy laws.
- 2013-08-19: Moore's law could stay on track with progress in extreme UV photolithography.
- 2013-08-19: The phenomenon of bullshit jobs.
- 2013-08-19: JavaScript ~~ double bitwise not is a fast alternative to Math.floor.
- 2013-08-19: Measuring the practical impact of DNSSEC deployment.
- 2013-08-19: B4: Google's private globally-deployed software-defined WAN.
- 2013-08-19: python-raven: ucam-webauth and Raven application agent in Python.
- 2013-08-19: Managed runtime initiative: a (failed) attempt to improve Linux kernel support for userland garbage collection.
- 2013-08-19: Teaching race to white kids.
- 2013-08-19: How Laura Poitras helped Snowden spill his secrets.
- 2013-08-18: C++ resumable functions: async and await.
- 2013-08-18: UK limits on political campaign spending will criminalize dissent.
- 2013-08-18: Update on PyPy software transactional memory.
- 2013-08-18: I hate the Pumping Lemma.
- 2013-08-18: UK border guards detain and interrogate journalist's partner over NSA/GCHQ spying reports.
- 2013-08-18: Jeff Dean on how neural networks are improving everything Google does.
- 2013-08-18: Are short methods actually worse?
- 2013-08-18: Truffle/Graal: one VM to rule them all: fast dynamic languages, with a Ruby prototype.
- 2013-08-18: Kal: a JavaScript reskin with async wait.
- 2013-08-18: Preferential voting explained by a dingo-punching koala.
- 2013-08-18: Cookieless cookies using ETag.
- 2013-08-18: 40 interesting maps.
- 2013-08-17: New tweets per second record: how it became possible.
- 2013-08-17: C ints are finite numbers! Using _Generic to define isnan().
- 2013-08-17: Graceful degradation of SVG image tags.
- 2013-08-17: Travels with Smalltalk.
- 2013-08-17: PiCL crypto review: Firefox sync / profile in the cloud.
- 2013-08-17: Effect of drug prohibition spending on addiction rates.
- 2013-08-17: C# async: Callbacks are our generation's goto statement.
- 2013-08-16: The International Olympic Committee supports Russia's homophobic law.
- 2013-08-14: What mercury being liquid at room temperature has to do with Einstein's theory of relativity.
- 2013-08-14: UK ISPs blindly block innocent web sites.
- 2013-08-14: Aircrew map of Britain.
- 2013-08-14: Understanding Russia's homophobia.
- 2013-08-14: Subverting BIND's SRTT algorithm: derandomizing NS selection.
- 2013-08-14: Why is cycling so popular in the Netherlands?
- 2013-08-14: Latitude, longitude? MQTTitude! A decentralized Google Latitude.
- 2013-08-14: Proof pearl: a verified bignum implementation in x86-64 machine code.
- 2013-08-13: Beery type designers hack Jupiler coasters.
- 2013-08-13: Babelmark FAQ: on the differences between Markdown implementations.
- 2013-08-13: Hacking Transcend WiFi SD cards.
- 2013-08-13: Railway safety doesn't need scare quotes: it works.
- 2013-08-13: 64-bit time_t now on OpenBSD.
- 2013-08-12: Return by value in C.
- 2013-08-12: Straight Pride UK try to censor their own press release.
- 2013-08-12: Hyperloop.
- 2013-08-12: Randomly failed! Weaknesses in Java SecureRandom.
- 2013-08-12: Every important person in Bitcoin just got subpoenaed by New York's financial regulator.
- 2013-08-12: Redefining 'undefined' in JavaScript.
- 2013-08-12: LightSquared investor sues GPS companies in attempt to recover wasted money.
- 2013-08-12: UKIP Cambridgeshire county council candidate charged with forging signatures on nomination form.
- 2013-08-12: Mio: a high-performance multicore IO manager for GHC.
- 2013-08-11: Newspapers in the US: How the post was lost.
- 2013-08-11: Reverse engineering Megamos car security crypto?
- 2013-08-11: When did we start trusting code without security management?
- 2013-08-11: Hamlet is banned at the British Library.
- 2013-08-10: Tallinn becomes "capital of free public transport".
- 2013-08-10: The history of the default iPhone message alert sound.
- 2013-08-10: The datacenter as a computer: an introduction to the design of warehouse-scale machines. (second edition)
- 2013-08-09: Kids can't use computers... and this is why it should worry you.
- 2013-08-09: Maybe the real state secret is that spies aren't very good at their jobs.
- 2013-08-09: British court blocks publication of VW Megamos security analysis.
- 2013-08-09: Two providers of secure email shut down.
- 2013-08-09: STACK: optimisation-unstable code checker.
- 2013-08-09: NSA to sack 90% of its system administrators.
- 2013-08-09: Urban grid management and the police state in China.
- 2013-08-09: Encrypted e-mail service linked to Edward Snowden shut down by US government.
- 2013-08-09: Americans are eight times more likely to be killed by cops than by terrorists.
- 2013-08-09: Why I changed my mind about cannabis.
- 2013-08-09: What is it about the Internet that turns people into massive dicks?
- 2013-08-08: Why everyone is pissed off about Google Chrome's password storage.
- 2013-08-08: A leap second bug led Facebook to develop better data center infrastructure management tools.
- 2013-08-08: The quiet carriage proficiency test.
- 2013-08-08: Staring at the sun: Dalvik vs. ASM.js vs. native code.
- 2013-08-08: What derailed the UK economic recovery?
- 2013-08-07: Typo: a programming language that runs in Haskell's type system.
- 2013-08-07: Shanghai 26 years ago and now.
- 2013-08-07: Should legal codes be copyrighted? Let's sue to find out!
- 2013-08-07: Defending against the BREACH https compression information leak attack.
- 2013-08-07: If Bruce Schneier ran the NSA, he'd ask a basic question: "Does it do any good?"
- 2013-08-07: The Toobin principle: repeal the concept of an informed public, repress your decision to take such a drastic step.
- 2013-08-06: Resistive RAM: a terabyte on a chip, smaller than flash.
- 2013-08-06: Former NSA chief terrified of nihilists, anarchists, activists, Lulzsec, Anonymous, twentysomethings.
- 2013-08-06: Bruce Sterling vs Internet freedom activists.
- 2013-08-06: The simplest periodic table: no numbers, no letters, just dots.
- 2013-08-06: Phabricator: code review, bug tracker, source browser, wiki...
- 2013-08-06: Configuring Apache, nginx, and OpenSSL for forward secrecy.
- 2013-08-06: Sterling's "The Ecuadorian Library" vs civil liberties groups.
- 2013-08-06: The use and abuse of civil forfeiture.
- 2013-08-06: Welcome to post-constitutional America.
- 2013-08-06: Remembering the Apple Newton's prophetic failure and lasting impact.
- 2013-08-05: Car hacking research paper and software.
- 2013-08-05: cson: compact textual json variant.
- 2013-08-05: A switch failure in Utah took out four big hosting providers.
- 2013-08-05: hlld: A high performance C server for HyperLogLog cardinality estimation.
- 2013-08-05: SNMP reflection/amplification DDoS: the vulnerability you might not know you have.
- 2013-08-05: Dava Sobel on leap seconds.
- 2013-08-05: Co-ordinated omission: when high-latency requests make performance statistics look better.
- 2013-08-04: Strongly universal string hashing is fast.
- 2013-08-04: Sharing science is a crime.
- 2013-08-04: Xerox scanners/photocopiers randomly alter numbers in scanned documents.
- 2013-08-04: Half of TOR sites compromised.
- 2013-08-04: Ethics and power in the long war.
- 2013-08-04: How to support both Python 2 and 3.
- 2013-08-03: Raft: an understandable consensus algorithm.
- 2013-08-03: etcd: a highly-available key value store for shared configuration and service discovery.
- 2013-08-03: Dust: a censorship-resistant Internet transport protocol.
- 2013-08-03: 40 unusual maps.
- 2013-08-03: Why did the NSA not have a contingency plan?
- 2013-08-03: Embedded C++
- 2013-08-03: International principles on the application of human rights to communications surveillance.
- 2013-08-03: The Ecuadorian Library: Bruce Sterling on the NSA.
- 2013-08-03: How we all pay for bankers.
- 2013-08-03: Archaeology: The milk revolution.
- 2013-08-03: Most Dutch undersea cables are operated by friends of GCHQ.
- 2013-08-03: If we ignore the human in the ‘troll', they will always exist.
- 2013-08-03: Universal Credit staff describe chaos behind scenes of flagship Tory reform.
- 2013-08-03: Writing advice from Chuck Palahniuk.
- 2013-08-03: Patient lost £18,000 data protection battle over GP medical records.
- 2013-08-03: Bikes are taking over London.
- 2013-08-03: Twitter issues new rules to crack down on abuse.
- 2013-08-03: What are your rights if stopped by Home Office officials in the street?
- 2013-08-03: Forebruary: a calendar for every month.
- 2013-08-03: Sweden does not produce enough rubbish to feed its power plants.
- 2013-08-03: How the Snowden saga will end.
- 2013-08-03: And I'm like, Quotative ‘like' isn't just for quoting.
- 2013-08-03: Penguin's insane policy on electronic galleys for authors.
- 2013-08-02: I can still see your actions on Google Maps over SSL.
- 2013-08-02: Carriers rush to fix SIM card vulnerability by hacking into them.
- 2013-08-02: Entire University of California goes open access.
- 2013-08-02: More UKBA racism.
- 2013-08-02: Paypal turns blind eye to payments totaling $35,000 for on-demand DDoS.
- 2013-08-02: How to talk to your daughter about her body.
- 2013-08-02: Updates to online archived news stories need to be kept current, rules High Court.
- 2013-08-02: The Snowden Effect: definition and examples.
- 2013-08-02: Goldman Sachs overstepped by criminally prosecuting its ex-programmer.
- 2013-08-02: Fast and loose reasoning is morally correct: treating languages as if they are total.
- 2013-08-01: Employer tipped off police to pressure cooker and backpack searches.
- 2013-08-01: The future of https on Wikipedia.
- 2013-08-01: NSA pays £100m in secret funding for GCHQ.
- 2013-08-01: Pressure cookers, backpacks and quinoa: Internet searches lead to visit from terrorist task force.
- 2013-08-01: NSA's Utah data centre construction project.
- 2013-07-31: OSI: the internet that wasn't.
- 2013-07-31: Great visualizations of twitter activity.
- 2013-07-31: PEG.js: parser generator for JavaScript.
- 2013-07-31: Most toxic behaviour does not come from toxic people.
- 2013-07-31: Practical demo of GPS spoofing with an $80 million yacht.
- 2013-07-31: How to help someone stopped for an immigration ID check.
- 2013-07-31: Testing embedded applications with greatest.
- 2013-07-31: Pictures of Tottenham Court Road Station works.
- 2013-07-31: The struct hack invokes undefined behaviour, from Pascal strings to Python tuples.
- 2013-07-30: NSA: the decision problem.
- 2013-07-30: A hole in our collective memory: copyright made mid-century books vanish.
- 2013-07-30: Naked ladies infected with smut fungus.
- 2013-07-30: There are plenty of contexts in which to be "neutral" is simply to be wrong.
- 2013-07-30: John Carmack's .plan files from 1997.
- 2013-07-30: OMG! They're using Windows RT!
- 2013-07-30: The "sea of nodes" approach in the Java HotSpot server compiler.
- 2013-07-30: Fungicides implicated in bee colony collapse disorder.
- 2013-07-30: Semantic hashing for similar document retrieval.
- 2013-07-30: Regulation, technology and caution are making fires a thing of the past.
- 2013-07-30: On the security of TLS: a systematic analysis.
- 2013-07-30: New York Subway map based on radial lines.
- 2013-07-30: Those who deny access to history are condemned repeatedly.
- 2013-07-30: Serco: the company that is ru[in]ning Britain.
- 2013-07-30: UK to charge £3000 bond for visas from six former colonies.
- 2013-07-30: A purely hypothetical conversation about censorship.
- 2013-07-29: A brief history of sour beer.
- 2013-07-29: Simplifying OTR deniability.
- 2013-07-29: GPS jamming.
- 2013-07-29: Who are the trolls?
- 2013-07-29: Raspberry Pi dashcam overlaid with OBD telemetry.
- 2013-07-29: Why YouTube buffers: The secret deals that make and break online video.
- 2013-07-29: Clever card fraud based on a land line user interface gotcha.
- 2013-07-29: Women-hating trolls come out on a radio call-in.
- 2013-07-29: How to choose randomly with a coin.
- 2013-07-29: Political momentum builds against NSA surveillance.
- 2013-07-29: The difference between Boolean objects and primitives in JavaScript.
- 2013-07-29: The surprisingly short history of the history of technology.
- 2013-07-29: SkyMall's SkyFall.
- 2013-07-28: Variable scoping in CoffeeScript and JavaScript.
- 2013-07-28: Scientist banned from revealing codes used to start luxury cars.
- 2013-07-28: US government is trying to get user account passwords.
- 2013-07-27: Le systeme Chappe: Napoleon's semaphore telegraph.
- 2013-07-27: Government bee scientist behind controversial study joins pesticide firm.
- 2013-07-27: Rape threats on Twitter won't get women to shut up. If we shout back we'll win.
- 2013-07-27: 20 years of attacks on RSA.
- 2013-07-27: We need an engineering-oriented replacement for Applied Cryptography.
- 2013-07-27: Hackers reveal nasty new car attacks.
- 2013-07-27: Anita Sarkeesian and the gamification of misogyny.
- 2013-07-27: Asciiflow: ASCII art flow diagram tool.
- 2013-07-26: When smart homes get hacked.
- 2013-07-26: Nate Silver's departure from the New York Times and fake vs real objectivity.
- 2013-07-26: Group messaging crypto and the CAP theorem.
- 2013-07-26: Stickonspy: NSA branded web cam stickers.
- 2013-07-26: Performance of Haskell vs ninja C.
- 2013-07-26: A measure of sacrifice: the mechanisation of time.
- 2013-07-26: Mozilla's work on eliminating conservative GC to support moving generational GC.
- 2013-07-26: Hollywood's takeover by Blake Snyder's formulaic screenwriting book, Save the Cat!
- 2013-07-25: Switching from Gmail to FastMail.
- 2013-07-25: The .pw and .la domain name auctions show there isn't much money in new TLDs.
- 2013-07-25: The hourglass: an underrated invention.
- 2013-07-25: US government is trying to get TLS private keys.
- 2013-07-25: FAQs: why gov.uk doesn't have them.
- 2013-07-25: Butterick's Practical Typography.
- 2013-07-25: Anti-usability dark patterns: the slippery slope.
- 2013-07-25: The unprofitable SaaS business model.
- 2013-07-25: The Mail claims victory in moral crusade.
- 2013-07-25: Macaw: the code-savvy web design tool.
- 2013-07-25: Is overblocking defamatory?
- 2013-07-25: LL and LR parsing demystified.
- 2013-07-24: The evolution of Direct3D.
- 2013-07-24: The vitamin myth.
- 2013-07-24: Lots of ideas for software.
- 2013-07-24: Common misconceptions about computers.
- 2013-07-24: CloudFlare's fourth generation server design.
- 2013-07-24: Crypto flaw makes millions of phone SIMs susceptible to hijacking.
- 2013-07-24: First confirmed patent application rejected due to Ask Patents.
- 2013-07-24: Visual Poi: very swish LED light-writing.
- 2013-07-24: Distributed flight array: autonomous robots self-assemble and take flight as one.
- 2013-07-24: What teachers make.
- 2013-07-19: Our new same-sex marriage is not yet equal marriage.
- 2013-07-19: AppleScript is protestant with a lower-case "p", as iOS and much of OS X is catholic with a lower-case "c".
- 2013-07-19: JavaScript isn't Scheme.
- 2013-07-19: North Sentinel: the forbidden island.
- 2013-07-19: Archives of the Board of Longitude now online.
- 2013-07-19: An arrest in response to the March DDoS attacks on Spamhaus.
- 2013-07-18: Pitch drop experiment drops pitch after 69 years.
- 2013-07-18: Gay marriage: a database engineering perspective.
- 2013-07-18: Your dog can get vaccinated against Lyme disease but you can't.
- 2013-07-17: What is the difference between common and civil law?
- 2013-07-17: If the NSA can't do it over the net, the CIA will pwn your computer in person.
- 2013-07-17: Should we regard young driver deaths as a scandal? RAC proposes graduated drivers licences.
- 2013-07-17: Which proposed new gTLDs suffer the most from squatting and bogus query traffic?
- 2013-07-17: Mission creep: when everything is terrorism.
- 2013-07-17: Update on Computing Service moves.
- 2013-07-16: A mechanical mosquito deterrent.
- 2013-07-16: Is the EU data protection regulation revision dead? If not, should it be?
- 2013-07-15: Who has the most web servers?
- 2013-07-15: USA gave asylum to someone who leaked classified documents.
- 2013-07-15: GitHub finally takes open source licenses seriously.
- 2013-07-15: Dyninst API for runtime code insertion.
- 2013-07-15: Cello: higher level programming in GNU C99.
- 2013-07-15: US CALEA supports the use of strong end-to-end encryption.
- 2013-07-15: Leaked letter shows ISPs and government at war over porn filters.
- 2013-07-15: Water is a better metaphor for the great firewall of China.
- 2013-07-15: Where the hell is the economic and political outrage?
- 2013-07-15: NSA backdoors in old Crypto AG ciphering machines.
- 2013-07-15: When a mathematical hypothesis is neither true nor false.
- 2013-07-15: Engineers and the managers they make.
- 2013-07-15: Where will all the traffic go when you remove an inner-city highway?
- 2013-07-15: Has patent, will sue: an alert to corporate America.
- 2013-07-15: Think your office is soulless? Check out this Amazon warehouse.
- 2013-07-14: HyperRogue III: a roguelike game in non-Euclidean space.
- 2013-07-14: A human-powered helicopter wins the $250,000 Sikorsky prize.
- 2013-07-14: Reduce latency by putting TLS endpoints near users.
- 2013-07-14: dygraphs: JavaScript visualization library.
- 2013-07-14: Travellers' mobile phone data seized by police at UK border.
- 2013-07-14: Why James Chartrand wears women's underpants.
- 2013-07-13: There is no benefit in reducing salt intake and it may even be dangerous.
- 2013-07-13: The USA's incarceration epidemic.
- 2013-07-13: Stig of the Dump: an appreciation on its 50th anniversary.
- 2013-07-13: Mozilla's root CA certificate store continues to grow.
- 2013-07-13: David Cameron told to sack strategy chief over corrupt link to tobacco giants.
- 2013-07-13: The death of David Kelly 10 years on.
- 2013-07-13: Wanting to build first without Javascript is not the same as hating it.
- 2013-07-13: An ingenious paper map with multiple zoom levels.
- 2013-07-13: What most Americans don't know about America.
- 2013-07-13: Changing the Creepy Guy narrative.
- 2013-07-13: The history of CTRL + ALT + DELETE.
- 2013-07-13: Using Phones/SMS for 2FA is unwise.
- 2013-07-13: The Ireland abortion debate, summed up in one disrespectful gesture.
- 2013-07-13: Staying on top of TLS attacks.
Tony Finch is
<dot@dotat.at>