Winograd and Flores in particular brings in sources like Heidegger and Gadamer that are rarely if ever read in fields dealing with cognitive science/AI.
Two books that are very interesting to read today in light of tech advances:
(1) Newell's Unified Theories of Cognition
(20 Winograd and Flores' Understanding Computers and Cognition
Both are diametric opposites from each other in terms of style/message/theory but also make valuable points about research goals for AI/cogsci/simulations.
If you own a Tizen powered hardware (Samsung), consider removing it from the Internet and your network. It’s incredibly insecure: https://motherboard.vice.com/en_us/article/samsung-tizen-operating-system-bugs-vulnerabilities #security #infosec
Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal
"Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks"
[...] Recent work has shown that Tor is susceptible to the previously unknown active BGP routing attacks, called RAPTOR attacks, which expose Tor users to more network-level adversaries. In this paper, we aim to mitigate and detect such active routing attacks against Tor. [...]
An interesting exchange on the ABLE ARCHER 83 exercises which caused the Soviets to start plan RYAN assuming imminent nuclear war.
The issue is whether or not the reaction of the Soviets was really as dramatic as has been thought until now.
At BSDCan, I'll be giving a tutorial "BGP for Sysadmins/Developers". This will be my first class I've taught solo.
My future intentions for this is to teach networking and #BGP for people that know nothing about networking. I found it somewhat difficult to move from Sysadmin to Network Admin, and I want to help others cross over if they want.
Not to mention, having a solid understanding of networking will help you with computers in general.
Edit: maybe you could actually turn this into a Masto-anthem if you remixed it and changed lyrics somewhat.
In new song, "toot it" lyrics would have someone rapping about tooting at people. "Boot it" side would be about running your own instance on your own DIY server.
Another song for the Masto-collection.
Meaning here has much different context than in the actual song, lol
Mastodon's federation introduces UX challenges.
One that worries me a lot is about message forgery. Anyone can forge a twoot, even cross-server.
Whereas Twitter Inc might be trustworthy enough to not forge transcripts. Anyone can run a Mastodon server and might want to abuse it to influence people (see Russian troll campaigns).
Should Mastodon "home servers" cryptographically sign updates? Should there be end-to-end signatures? Anyone has thoughts on this?
George Kadianakis, Claudia V. Roberts, Laura M. Roberts, Philipp Winter,
"Anonymous Keys in Tor relays"
[...]Our experiments revealed that ten relays shared moduli, and 3,557 relays -- almost all part of a research project -- shared prime factors, allowing adversaries to reconstruct private keys. We further discovered 122 relays that used non-standard RSA exponents, presumably in an attempt to attack onion services.[...]
Federated timeline is running much closer to realtime now on the Mastodon.social instance (w00t @Gargron) with ~20 minute lag and the occasional toot from 3 hours ago thrown in because lol.
Noticed toots from here show up faster on smaller instances. Which is confusing but interesting since it suggests federating toots is prioritized over displaying them locally. Making a dark account could be an idea if any of you oliphaunts want to see a more responsive stream.
this is the glass cube i've trapped twitter ceo jack dorsey inside
Computers, simulation, strategy, and society. Learn more at https://aelkus.github.io
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!