How Heartbleed Leaked Private Keys
(blog.cloudflare.com)
2014 Archive
8881.
8882.
8883.
iCloud for Developers
(developer.apple.com)
8884.
Gabe Newell: Valve, VAC, and trust
(reddit.com)
8885.
How Boston Police Used Facial Recognition Technology to Spy on Thousands
(noisey.vice.com)
8886.
Hawala: The Working Man’s Bitcoin
(priceonomics.com)
8887.
8888.
The perfect shape
(bannalia.blogspot.com)
8889.
Things you should know about Token-based Authentication
(blog.auth0.com)
8890.
Open Source Business Models
(heavybit.com)
8891.
CVE-2014-7284: Lack of randomness in Linux kernel network secrets
(secondlookforensics.com)
8892.
Combating bad science
(economist.com)
8893.
Tenus – Golang Powered Linux Networking
(containerops.org)
8894.
Security experts boycott prominent security conference over NSA ties
(washingtonpost.com)
8895.
LibreSSL on Gentoo
(blog.hboeck.de)
8896.
My history with Forth and stack machines (2010)
(yosefk.com)
8897.
Show HN: The Entrepreneur's Guide to Finding Your First Customers
(yourfirstcustomers.com)
8898.
8899.
Porting GHC: A Tale of Two Architectures
(chiark.greenend.org.uk)
8900.
8901.
Huge chimpanzee population thriving in remote Congo forest
(theguardian.com)
8902.
Racket mode for GNU Emacs
(github.com)
8903.
8904.
Stuxnet: Zero Victims
(securelist.com)
8905.
A few useful things to know about machine learning (2012) [pdf]
(cs.washington.edu)
8906.
Why Bloom filters work the way they do (2012)
(michaelnielsen.org)
8907.
Goodbye One Laptop per Child
(olpcnews.com)
8908.
276
(the276.org)
8909.
8910.