13 private links
walled culture by glyn moody, as free ebooks
How Big Content Uses Technology and the Law to Lock Down Culture and Keep Creators Poor
An online exhibition of pretty software bugs, a museum of accidental art. Open for submissions!
recommendation documents archive of the International Telecommunication Union
There's a different way to put pictures in QR codes. Instead of scribbling on redundant pieces and relying on error correction to preserve the meaning, we can engineer the encoded values to create the picture in a code with no inherent errors
(2012)
Interactive article explaining how GPS works.
The Minor Planet Center (MPC) is the single worldwide location for receipt and distribution of positional measurements of minor planets, comets and outer irregular natural satellites of the major planets. The MPC is responsible for the identification, designation and orbit computation for all of these objects.
Valetudo is a standalone binary, which runs on rooted Vacuums of the Xiaomi ecosystem and aims to enable the user to operate the robot vacuum without any Cloud Connection whatsoever.
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.
It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology and forensic evidences.
Vendor blurb:
OpenSearch is a community-driven, open source search and analytics suite derived from Apache 2.0 licensed Elasticsearch 7.10.2 & Kibana 7.10.2. It consists of a search engine daemon, OpenSearch, and a visualization and user interface, OpenSearch Dashboards. OpenSearch enables people to easily ingest, secure, search, aggregate, view, and analyze data.
The combination of predictive accuracy and mysterious or unexplainable properties results in myth-making about deep learning’s transcendent, superhuman capacities, especially when it is applied in social settings. We analyze how discourses of magical deep learning produce techno-optimism, drawing on case studies from game-playing, adversarial examples, and attempts to infer sexual orientation from facial images. Enchantment shields the creators of these systems from accountability while its deterministic, calculative power intensifies social processes of classification and control.
This site provides reasonably detailed information on various thin client hardware I have had my hands on so that you can assess whether a particular one can be tailored to meet your own needs.
...uses Instant Webcam on the iPhone
ovh Bastion system, a Policy Enforcement Point for administrative ssh sessions
The biggest advantage of systemd service interface is that is offers a common interface to many distinct security features of Linux kernel in a single service definition, where they can be applied along with other service-specific flags.
People do, of course, design object-oriented programs, and they do so successfully. But they do so by mapping them onto procedures. A use case document recognisable by Ivar Jacobson lists the steps taken by the user to achieve a goal, and documents the flow of data through the system. This being too wordy and not Agile™ enough, it is replaced by the user story, but what is a story other than a sequential description of events with a beginning, a middle, and an end
EtherDFS is an 'installable filesystem' TSR for DOS. It maps a drive from a remote computer to a local drive letter, using raw ethernet frames to communicate.
tests which recursors are being used to resolve the DNS requests from your curtent browser instance