Entropy Attacks (hashing more entropy sources can hurt)
(blog.cr.yp.to)
February 2016 Archive
22231.
22232.
The best (and worst) dating apps
(sdtimes.com)
22233.
What If Twitter Algorithm Was Like This?
(medium.com)
22234.
What I didn’t read in the TTIP reading room
(waronwant.org)
22235.
Complete Guide: Best Tech and Software Conferences in 2016
(techbeacon.com)
22236.
Library Evolution Support in Swift ('Resilience')
(jrose-apple.github.io)
22237.
Awesome Atom
(github.com)
22238.
22239.
Stop Asking Me to “Sign Up”
(medium.com)
22240.
WW3 RAPIST WANTS IT LEGAL,LIKE MUSLIM
(youtube.com)
22241.
22242.
22243.
22244.
Top DevOps conferences to attend in 2016
(techbeacon.com)
22245.
22246.
22247.
22248.
22249.
Positive Space – Simply Converse
(positivespace.io)
22250.
22251.
22253.
22254.
22255.
22256.
Solving quadruple dependency injection problem in Angular
(blog.rogach.org)
22257.
Lean is less about money and more about mindset
(medium.com)
22258.
A little program to automagically send files
(github.com)
22259.
How Will Google Monetize Google Maps?
(quora.com)
22260.