- dw_news | PSA: Likely LiveJournal password compromise
- Passwords used on LiveJournal around 2014 have probably been compromised. Dreamwidth noticed because accounts where people had common passwords on both sites got hacked on DW. Use a password manager, people.
(tags: livejournal fail security password dreamwidth)
- Books in Which No Bad Things Happen | Tor.com
- A list, including contributions from commenters.
(tags: books science-fiction)
- Walks south of Cambridge
- I did one, it was nice. Bookmarking to try others.
(tags: walking hiking cambridge)
- bigH/git-fuzzy: interactive `git` with the help of `fzf`
- A CLI interface to git that relies heavily on fzf (version 0.21.0 or higher).
(tags: git productivity fzf)
- The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED
- “It was a perfect sunny summer afternoon in Copenhagen when the world’s largest shipping conglomerate began to lose its mind.”
(tags: russia hacking Security)
- Installing Ubuntu on VirtualBox How To
- Exploiting modern microarchitectures: Meltdown, Spectre, and other attacks
- Presentation from Redhat which goes into detail about the attacks.
(tags: cpu meltdown spectre security redhat hacking)
- Don’t mistake the British public’s leftie economic views for liberalism
- About half of us still support the death penalty, and about half of us think equality for women has achieved enough progress.
(tags: Politics survey opinion poll feminism)
- Simulating Religion: A Christian takes stock of Silicon Valley’s rationalist community by Alexi Sargeant
- A Christian takes stock of Silicon Valley’s rationalist community
(tags: lesswrong rationalism eliezer-yudkowsky Christianity philosophy transhumanism)
- How evolutionary biology makes everyone an existentialist | Aeon Essays
- “Each variant of human desire is ‘natural’, not in the sense of being required, but only of being made possible by nature. And it is in what nature makes possible, not in what it necessitates, that we should look for the answer to the question about what we should be or do.”
(tags: philosophy ethics existentialism evolution biology)
- Notes from the Intelpocalypse [LWN.net]
- A good, reasonably technical, summary of the Spectre and Meltdown attacks.
(tags: cpu hardware spectre meltdown security intel)
- The Most Common Error in Coverage of the Google Memo – The Atlantic
- TL;DR: it wasn’t anti-diversity. Via @sonyaellenmann.
(tags: google sexism politics social-justice diversity)
- The Google Memo: What Does the Research Say About Gender Differences? | HeterodoxAcademy.org
- “1. Gender differences in math/science ability, achievement, and performance are small or nil…
2. Gender differences in interest and enjoyment of math, coding, and highly “systemizing” activities are large. …
3. Culture and context matter, in complicated ways. Some gender differences have decreased over time as women have achieved greater equality, showing that these differences are responsive to changes in culture and environment. But the cross-national findings sometimes show “paradoxical” effects: progress toward gender equality in rights and opportunities sometimes leads to larger gender differences in some traits and career choices. Nonetheless, it seems that actions taken today by parents, teachers, politicians, and designers of tech products may increase the likelihood that girls will grow up to pursue careers in tech, and this is true whether or not biology plays a role in producing any particular population difference.”
(tags: feminism google diversity psychology gender politics)
- Suzanne Sadedin’s answer to What do scientists think about the biological claims made in the anti-diversity document written by a Google employee in August 2017? – Quora
- Dr Sadedin’s is the best rebuttal to the Google memo that I’ve seen (as the rest just call it bad without rebutting it).
(tags: science google gender sexism psychology)
- How To Add A Security Key To Your Gmail (Tech Solidarity)
- 2FA without the SMS/phone number backup (which can be hacked by social engineering your mobile phone network provider).
(tags: email google 2fa authentication security)
- How work changed to make us all passionate quitters | Aeon Essays
- Alleges that neoliberalism encourages employees to see themselves as the CEO of “Me, Inc”, always looking for tasks that’ll help them get their next job. Interesting final section about the modern obsession with “passion”.
(tags: capitalism business work economics career)
- Troy Hunt: Introducing 306 Million Freely Downloadable Pwned Passwords
- A service where you can check the clear text (if you trust the site owner) or hash of passwords to see whether they’ve leaked in any of the site hacks over the years.
(tags: security passwords api)
- Operation Luigi: How I hacked my friend without her noticing
- Funny stream of consciousness thing about hacking a friend (with permission). Time to enable 2FA on your stuff, people.
(tags: hacking phishing funny email authentication passwords)
- Steve Dutch: Conservative Cranks and Liberal Meta-Cranks
- What are the differences between cranks on both sides? Conservative ones are generally stupid, liberal ones are clever rationalisers.
(tags: politics cranks conservative liberal)
- Becoming Atheist: Humanism and the Secular West | Reviews in History
- Russel Blackford reviews a book about the social history of atheism in the 20th Century in the West, looking especially at the gender differences in how interviewees expressed their reasons for leaving religion.
(tags: atheism history gender russell-blackford)
- The Evolution of Trust
- Interactive exploration of repeated Prisoner’s dilemma type games, where you can play with payoffs and strategies.
(tags: trust game mathematics maths)
- Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom’s Wi-Fi Chipsets | Exodus Intelligence
- Broadcom kicking it old school: “In order to facilitate patching, an extensive thunk table is used in RAM, and calls are made into that table at specific points during execution. Should a bug fix be issued, the thunk table could be changed to redirect to the newer code.”
(tags: android wifi broadcom broadpwn security)
- Circles Sines and Signals – Introduction
- Some nice graphics introducing the Discrete Fourier Transform.
(tags: learning fourier-transform signal dsp)