…so, after a couple of years of trying to leave the idea aside, I finally bought a 3D printer. I'm really amazing how good is a cheap printer (€217) nowadays, and how easy it was to set it up. In the first concave prints I had lots of stringing, which I solved as suggested by CHEP. So, yes, now I own a 118dB whistle and I don't even know why. :P You can follow my experiments in this Google Photos album:
Seems like what this really means is that all the links in your private emails will be sent to the USA where a bot will open them one by one using Chrome. Yes, even when using it "On Premise". I might be naïve but this seems like a big can of #privacy worms. #GDPR anyone?
Shortly on your mobile phone (and elsewhere) the new and shiny emoticon that any Italian would read as «what the fuck do you want?» or «what are you talking about? that's bullshit!». Use it with care. ;)
I quote from the article: How is this system going to avoid being a massive privacy nightmare? The good news is that Apple claims that their system actually does provide strong privacy, and that it accomplishes this using clever cryptography. But as is typical, they’ve declined to give out the details how they’re going to do it. […] an incomplete technical description that Apple provided to Wired […] provides many hints. Unfortunately, what Apple provided still leaves huge gaps. It’s into those gaps that I’m going to fill in my best guess for what Apple is actually doing.
«There is a weird belief amongst policy makers that hacking an encryption system's key management system is fundamentally different than hacking the system's encryption algorithm. The difference is only technical; the effect is the same. Both are ways of weakening encryption.»
From a G7 meeting of interior ministers in Paris this month, an "outcome document": Encourage Internet companies to establish lawful access solutions for their products and services, including data that is encrypted, for law enforcement and competent authorities to access digital evidence, when it is removed or hosted on IT servers located abroad o...
The Five Eyes -- the intelligence consortium of the rich English-speaking countries (the US, Canada, the UK, Australia, and New Zealand) -- have issued a "Statement of Principles on Access to Evidence and Encryption" where they claim their needs for surveillance outweigh everyone's needs for security and privacy. ...the increasing use and sophistic...
Welcome to the Royal Academy TIE on Mars! Vika is ready to fight to be the best, Minerva wants to lose her V-card with David, while Miranda's emotions are her worst enemy. Meanwhile, the senpai Faith and Samantha (best frenemies forever) watch over all of them. Be ready to answer the question: is there LOVE on Mars?
(CC-BY-NC 2.5) There are lots of very smart people doing fascinating work on cryptographic voting protocols. We should be funding and encouraging them, and doing all our elections with paper ballots until everyone currently working in that field has retired.
Do you hate when Windows® happily decides the position of your windows isn't so important and scrambles them all around (e.g. after a resolution change, launching a full screen game, or attaching an extra monitor)?
Now you can use this, a public domain software I found on GitHub and improved to fix Win10 support some time ago.
A video with Don Knuth himself, about my favorite book of him, seeing this video (and reading the actual book) highly suggested if you love #math (or would want to), as Surreal Numbers (invented by Conway) are one of the most neat and elegant construction than I ever knew. #numbers #science
In mathematics, the surreal number system is a totally ordered proper class containing the real numbers as well as infinite and infinitesimal numbers, respectively larger or smaller in absolute value than any positive real number. The surreals share many properties with the reals, including the usual arithmetic operations (addition, subtraction, mu...