Who BLEW Up the Nordstream 2 Pipeline? (w/ Aaron Mate) This week, I spoke with The Grayzone & Useful Idiot's Aaron Mate about who blew up the Nordstream 2 pipeline, the threat of nuclear war, and what western med...
Privacy as Product The way in which most businesses approach privacy issues is far from ideal and more often than not self-defeating. Compliance with data regulations has imposed itself as the central part of the work when privacy really is a product concern: as aspect you ...
Teach Yourself Programming in Ten Years Why is everyone in such a rush? Walk into any bookstore, and you'll see how to Teach Yourself Java in 24 Hours alongside endless variations offering to teach C, SQL, Ruby, Algorithms, and so on in a few days or hours. The Amazon advanced search for [ti...
There are three types of meetings. I have a system – a survival mechanism, really – for classifying, planning, and executing meetings in a way that helps keep me sane at work.
A marble changed my perception22 May, 2022 In my city, winter is generally colder than in any other city around us because it surrounded by mountains which creates isolated weather, and causes drastically low humidity. Without water, air can’t smoothen the temperature, the consequence of that weat...
Why is it hard to learn another programming language? Even the most experienced programmers face difficulties learning a new language. A recent study looked into the reasons why!
List of governmental design systems Wait, what’s a design system A Design System is like a reusable library of components, visuals and principles. Through composition, the system can scale to offer a path for to create a coherent UX for designers and developers of digital products and servi...
What Happened to You, Scott? (or, Openness vs. Conviction) The Website of Scott P. Scheper of San Diego, California.
How does the key exchange in HTTPS work? In this small blog post we will have a look at how HTTPS works. Well, we will look how the cryptographic part works a bit more in detail. The focus is on the Diffie Hellman Key algorithm, an asymmetric key exchange.
Smaller debug info with constructor type homing Constructor type homing for debug info Background Class type information is a large contributor to debug info size. Clang already has a few optimizations to reduce the size of class type information based on the assumption that debug info can be spread ou...
Hard Mode Rust This post is a case study of writing a Rust application using only minimal, artificially constrained API (eg, no dynamic memory allocation).It assumes a fair...
Threshold ECDSA in Excessive Detail Listen now (78 min) | In which I talk about ECDSA, and various ways of thresholdizing it.
CK's Cold Dive Musings about technology, cryptography, and whatever else is on my mind. Click to read CK's Cold Dive, by cronokirby, a Substack publication. Launched 2 months ago.
RAID: Bigger, Better, Faster Storage - How, What, and Why? What is RAID and how does it work? Why would you use RAID and what are the benefits in terms of performance and reliablity? Dave Explains mirroring, stripi...
Rendering Doom With Emojis - CrociDBlog It seems that creating a doom port, or hacking doom in general, is a common place for programmers. If you search for “doom port” on github, it’s inspiring how diverse projects you can find. The fact that the source code for the game is completely open and...
Overzealous Destructuring | Aleksandr Hovhannisyan Destructuring in JavaScript has many clever uses that can make your code more expressive and compact. But overusing it can make your code harder to read, trickier to debug, and more error prone.
Privacy As A Moral Buffer — Simon Berens Epistemic Status: Overly Opinionated There will always be a "gap" between morality and law. Sometimes the gap is "loose", in which case people have more freedom. (This doesn't necessarily have to be a good thing, e.g. sectors lacking regulation.) Someti...
Small correlations can drive large increases in teen depression · Chris Said How a small correlation with social media can drive a 50% increase in teen depression
Red Meat Friday: Is The FSF Fighting The Previous War? This is a bit genuine red meat and perhaps a little sensitive for some people but it does raise a point that deserves discussion. A shorthand for that point is the title of today’s post. A more descriptive way of describing it is, “Is the FSF’s demand for...
Thomas Tanay | How government expenditures finance themselves And other observations from an explorable stock-flow consistent model
Learnings as a Tech Lead What makes a great TL? Sharing what I've learned in the past 1.5 years as a TL at Google. Topics include: engaging in design discussions, leading by example, creating space for others, become better at context switching but limiting work in progress, writ...
Lessons Learned From Three Years of Open Source Contributions Insights from my three year journey as an open source contributor.
Setting up my new computer, vim, and listening to Spotify in the terminal I recently got a new laptop, and I decided that this would finally be the time that I don't set it up in a completely ad hoc way. Previously I would install every program I needed as I needed it, with no real plan of how I would replicate the setup if I n...
When Life Gives You an Integer tags: math-that-isn’t-useful "God made the integers; all else is the work of man" - Leopold Kronecker There is no smallest integer that has no interesting...
Why remote work might end There are people who bring high energy to work. Take ownership. They will always thrive, be it WFH or at office.