What made the Irish famine so deadly
newyorker.com
Software-Defined Radio for Engineers (2018) [pdf]
analog.com
Mathematical Foundations of Reinforcement Learning
github.com
People are just as bad as my LLMs
wilsoniumite.com
Canon EF and RF Lenses – All Autofocus Motors
exclusivearchitecture.com
An election forecast that's 50-50 is not "giving up."
statmodeling.stat.columbia.edu
STEPS Toward the Reinvention of Programming [pdf]
tinlizzie.org
Performance of the Python 3.14 tail-call interpreter
blog.nelhage.com
Show HN: In-Browser Graph RAG with Kuzu-WASM and WebLLM
blog.kuzudb.com
Music labels will regret coming for the Internet Archive, sound historian says
arstechnica.com
How to Implement a Cosine Similarity Function in TypeScript
alexop.dev
Zero-Downtime Kubernetes Deployments on AWS with EKS
glasskube.dev
A technical history of Acorn Computers
mcmordie.co.uk
uBlock Origin is no longer available on the Chrome Store
chromewebstore.google.com
Sigint in Fiction
siginthistorian.blogspot.com
3dfx: So powerful, it's kind of ridiculous (2023)
abortretry.fail
Probabilistic Artificial Intelligence
arxiv.org
Firmware update bricks HP printers, makes them unable to use HP cartridges
arstechnica.com
British tourist detained by US authorities for 10 days over visa issue
theguardian.com
Trees not profits: we're giving up our right to ever sell Ecosia (2018)
blog.ecosia.org
Apple Exclaves
randomaugustine.medium.com
FurtherAI (YC W24) Is Hiring
ycombinator.com
> Perhaps the process of cryptanalysis is of limited interest to the reader of a novel because the process of Sigint – interception, analysis, cryptanalysis – is analogous (though less interesting) to having somebody physically steal a copy of the message.
Active adversarial SIGINT fits the analogy of "stealing a copy of a message", sure.
Passive mass SIGINT is something entirely different, though. It's hard to even come up with an analogy that doesn't invoke some kind of magic.
Imagine, for example, if paper mail were exchanged using locked safes instead of paper envelopes — safes that all have thousand-digit combinations that nobody's going to ever brute-force. But, deep within USPS, there exists a machine that can clone these safes, without opening them — a very literal black-box operation. USPS takes these cloned safes and stores them all in a warehouse. And then, one day, the NSA manages to figure out a vulnerability in the manufacture of one model of safe, that allows them to crack open all of that type of safe. So, suddenly, they have access to millions of pieces of mail people have sent over years/decades.
See? This analogy isn't even helpful. Can someone come up with something better?