How ‘radioactive data’ could help reveal malicious AIs

Computers can be understood
The end-to-end principle in distributed systems

Fountain codes and animated QR · divan's blog
The Big Hack

A Primer on Public-key Encryption
Continuous Delivery Sounds Great, but Will It Work Here?
Sudhakar's Blog
A simple synchronization algorithm
How Classical Cryptography Will Survive Quantum Computers

31d6b300-be2a-11e6-94ac-3d324840106c_story.html

A New Era of Internet Attacks Powered by Everyday Devices
Envisioning the Hack That Could Take Down New York City

These unlucky people have names that break computers

The Ghost of Statistics Past
China Appears to Attack GitHub by Diverting Web Traffic

Evolution of the Product Manager
The Cost of Cryptography

How Two Men Unlocked Modern Encryption

headroom-hacker
Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
Hackers in China Attacked The Times for Last 4 Months

rethinking-the-computer-at-80.html?src=dayp