How ‘radioactive data’ could help reveal malicious AIs
Computers can be understood
The end-to-end principle in distributed systems
Fountain codes and animated QR · divan's blog
The Big Hack
A Primer on Public-key Encryption
Continuous Delivery Sounds Great, but Will It Work Here?
Sudhakar's Blog
A simple synchronization algorithm
How Classical Cryptography Will Survive Quantum Computers
31d6b300-be2a-11e6-94ac-3d324840106c_story.html
A New Era of Internet Attacks Powered by Everyday Devices
Envisioning the Hack That Could Take Down New York City
These unlucky people have names that break computers
The Ghost of Statistics Past
China Appears to Attack GitHub by Diverting Web Traffic
Evolution of the Product Manager
The Cost of Cryptography
How Two Men Unlocked Modern Encryption
headroom-hacker
Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
Hackers in China Attacked The Times for Last 4 Months
rethinking-the-computer-at-80.html?src=dayp