Tweetovi

Blokirali ste korisnika/cu @ikubjas

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ikubjas

  1. proslijedio/la je Tweet
    3. velj

    In January, , , and I ran a short class at on topics we think are missing in most CS programs — tools we use every day that everyone should know, like bash, git, vim, and tmux. And now the lecture notes and videos are online!

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    A new way of working with Protocol Buffers. Buf's goal is for Protobuf to not only be a good choice on the technical merits, but to be so easy to use that the decision is trivial.

    Poništi
  3. 3. velj

    I didn't know that there were non-anonymous caucuses anywhere. It shows that it is essential to understand the local context when discussing online voting anywhere. This also goes about criticizing systems - the particular threat model may be different.

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    This news reminds me of the European Space Agency in saying that "human beings" usually cannot "access flying spacecraft" so "there is no need for side channel attack protection". Serious attackers build machines to carry out attacks beyond human ability.

    Poništi
  5. proslijedio/la je Tweet
    1. velj

    All major browser clients plan to disable TLS 1.0 and TLS 1.1, starting with Chrome and Firefox in March. already anticipates and caps the grade to B when you still have TLS 1.0 and 1.1 enabled. Not so long anymore to get this sorted for your web apps and sites

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    1. velj

    99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    31. sij

    My student Denis wrote a formal semantics for the French tax code, complete with Coq proof of soundness and SMT queries to uncover unfair tax hikes. PL for fiscal justice!

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    1. velj

    No hw wallet (or HSM, really) is secure against a sufficiently powerful attacker with unlimited physical access, but Ledger and other somewhat-tamper-protected wallets are much safer to casually let out of your sight. OTOH, harder for users to self-validate the hw. Tradeoffs.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    30. sij

    Google loves security keys, and today announced an open source implementation to help spur further innovation from the security research community 1/ .

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    30. sij

    1/11: It’s the start of the Australian academic year, time for another stoush about free communication with the so-called ‘defence’ forces of my own country. (And a cheerful reminder that my views are my own and not the official position of the University of Melbourne.)

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    29. sij

    After two years of not using Facebook - I logged in today to check out this new tool that shows what Facebook has been tracking. Despite this, they have seen my every move on the Internet - this is creepier than I had imagined.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    29. sij

    More than a million registered in the area can now cast a ballot for the to the Conservation District using a or 📲🗳️ Organisers are calling this pilot the largest effort in the country

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    Amazon appears to be tracking every tap on Kindle. I just got my data back and there are 90K rows of this

    spreadsheet showing tons of time stamps and 'NextPageWithTap' 

	2018-01-31T23:39:05.000Z	2018-01-31T23:39:03.000Z	NextPageWithTap		Book:Reading:MainContent	2018-01-31T23:21:03.000Z			
	2018-01-31T23:39:05.000Z	2018-01-31T23:39:03.000Z			Book:Reading:MainContent	2018-01-31T23:21:03.000Z	Text		
	2018-01-31T23:39:05.000Z	2018-01-31T23:39:03.000Z			Book:Reading:MainContent	2018-01-31T23:21:03.000Z	PHL
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    28. sij

    “Proposals for Go 1.15” by posted on the Go Blog.

    Poništi
  15. proslijedio/la je Tweet
    28. sij

    A new use case for GPG: Find self-cooked government software with even less usability and then push GPG as the better repleacement I think that can plausibly work.

    Poništi
  16. proslijedio/la je Tweet
    28. sij

    UK has some 40 security-cleared folks looking specifically at Huawei under a special arrangement. Software quality is apparently not very impressive (hardly surprising). Distinguishing between plain old stupid and malicious is always difficult.. Interesting report.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    28. sij

    BREAKING: We’ve confirmed that the Ring doorbell app on Android covertly shares personally identifiable information on its users with third-party companies, including Facebook.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    28. sij
    Poništi
  19. proslijedio/la je Tweet
    28. sij

    I’ve worked with people from Huawei and they were thoughtful and intelligent. I don’t see Huawei as particularly malicious. But if your threat model is “the Chinese government can make Huawei behave maliciously,” code reviews aren’t going to save you.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    The Brits have a fundamentally different approach to the Huawei problem. They believe they can manage the risk. There are actually a number of US intelligence officials who agree with them.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·