No networking required. The post has a demo of a chat app communicating across unprivileged containers.
h4x0r.org/funreliable/
ALA Explains the Donation: ala.org/CAH
#IGM25
ALA Explains the Donation: ala.org/CAH
#IGM25
hadley.github.io/genzplyr/
hadley.github.io/genzplyr/
Our new meta-analysis finds robust evidence of moral contagion (N=4,821,006)
The moral contagion effect is even stronger in larger, pre-registered studies (17%).
academic.oup.com/pnasnexus/ar...
Our new meta-analysis finds robust evidence of moral contagion (N=4,821,006)
The moral contagion effect is even stronger in larger, pre-registered studies (17%).
academic.oup.com/pnasnexus/ar...
There's no inherent reason the complexity of a control should affect its effectiveness. In fact, I'd expect fancier controls to provide better security than basic ones.
There's no inherent reason the complexity of a control should affect its effectiveness. In fact, I'd expect fancier controls to provide better security than basic ones.
I'm trying to share, not tell Google everyone I share with.
I'm trying to share, not tell Google everyone I share with.
How is knowledge transmitted across generations in a foraging society?
With @danielredhead.bsky.social
we found: In BaYaka foragers, long-term skills pass in smaller, sparser networks, while short-term food info circulates broadly & reciprocally
academic.oup.com/pnasnexus/ar...
How is knowledge transmitted across generations in a foraging society?
With @danielredhead.bsky.social
we found: In BaYaka foragers, long-term skills pass in smaller, sparser networks, while short-term food info circulates broadly & reciprocally
academic.oup.com/pnasnexus/ar...
Dutch Waterfall scans coming out of the Netherlands, how you can tell over 1,400 IPs are working together, and novel temporal fingerprinting/visualization for scan traffic!
My PhD research.
lightscope.isi.edu
Dutch Waterfall scans coming out of the Netherlands, how you can tell over 1,400 IPs are working together, and novel temporal fingerprinting/visualization for scan traffic!
My PhD research.
lightscope.isi.edu
It feels like we're saying "We can't trust you to give your password. So we've given your password to your device who we trust both to identify you and identify who's getting your password."
It feels like we're saying "We can't trust you to give your password. So we've given your password to your device who we trust both to identify you and identify who's getting your password."
doi.org/10.5281/zeno...
We unpick the tech industry’s marketing, hype, & harm; and we argue for safeguarding higher education, critical
thinking, expertise, academic freedom, & scientific integrity.
1/n
doi.org/10.5281/zeno...
We unpick the tech industry’s marketing, hype, & harm; and we argue for safeguarding higher education, critical
thinking, expertise, academic freedom, & scientific integrity.
1/n
www.gofundme.com/f/support-mi...