Upgrade Your iPhone Passcode to Defeat the FBI’s Backdoor Strategy
(theintercept.com)
February 2016 Archive
10141.
10142.
10143.
Bruce Schneier – Questions and Answers
(youtube.com)
10144.
A Kinder, Gentler Inquisition (1998)
(nytimes.com)
10145.
Use Network Link Conditioner When Testing Your App
(medium.com)
10146.
10147.
An Open Letter to My CEO
(medium.com)
10148.
What’s Next in Computing?
(medium.com)
10149.
The GoPiGo Robot for Raspberry Pi
(github.com)
10150.
Twitter Is Not a Failure
(theatlantic.com)
10152.
Blind Twitter chrome extension will remove all usernames until you RT/fav/reply
(chrome.google.com)
10153.
Learn React-Redux in 7 minutes
(medium.com)
10154.
10155.
MalwareBytes: multiple security issues
(code.google.com)
10156.
10157.
Backdoored Linux Mint, and the Perils of Checksums
(micahflee.com)
10158.
High Performance Computing with HPX
(blog.brakmic.com)
10159.
How to Break MD5 and Other Hash Functions (2005) [pdf]
(merlot.usc.edu)
10160.
10161.
The idea maze for AI startups
(cdixon.org)
10162.
A process of Compliance: Multi-core processor speeds
(cap.org.uk)
10163.
Why Zelda Was So Revolutionary When It Came Out 30 Years Ago
(motherboard.vice.com)
10164.
Opinionated deployment tools and Kubernetes
(blog.jonparrott.com)
10165.
Exoplanet Census Suggests Earth Is Special After All
(scientificamerican.com)
10166.
Show HN: Supporter
(supporter.60devs.com)
10167.
A review of compulsive buying disorder (2007)
(ncbi.nlm.nih.gov)
10168.
GitHub AMA goes a bit awry
(github.com)
10169.
10170.
Retrograde analysis
(en.wikipedia.org)