What the CIA WikiLeaks Dump Tells Us: Encryption Works
If the tech industry is drawing one lesson from the latest WikiLeaks disclosures, it's that data-scrambling encryption works, and the industry should use more of it.
Hasnain has not yet written a summary for this.
Posted on 2017-03-11T08:17:10+0000
WECT : Video shows WPD sergeant falsely telling citizen to stop recording him because of state law
<p>WILMINGTON, NC (WECT) - A Wilmington police sergeant is shown on video instructing a citizen who was pulled over for a traffic stop that he is not allowed to record the interaction due to a ne
donnemartin/system-design-primer
system-design-primer - Learn how to design large scale systems. Prep for the system design interview.
Hasnain says:
This looks like an amazing resource for preparing for systems design interviews
Posted on 2017-03-09T04:59:25+0000
mattfriz.com
www.mattfriz.com
Hasnain says:
So good. Great piece on the tech interview torture chamber
""I see your background is in artificial intelligence, you've written your own compiler, and you maintain an open source project - how nice. Now implement radix sort using only red-black trees.""
Posted on 2017-03-08T05:52:10+0000
Greg
A lot of people ask me what the ideal cofounder looks like. I now have an answer: Greg Brockman. Every successful startup I know has at least one person who provides the force of will to make...
Hasnain has not yet written a summary for this.
Posted on 2017-03-08T05:49:43+0000
Why Facts Don’t Change Our Minds
New discoveries about the human mind show the limitations of reason.
Hasnain says:
"“This is how a community of knowledge can become dangerous,” Sloman and Fernbach observe. The two have performed their own version of the toilet experiment, substituting public policy for household gadgets. In a study conducted in 2012, they asked people for their stance on questions like: Should there be a single-payer health-care system? Or merit-based pay for teachers? Participants were asked to rate their positions depending on how strongly they agreed or disagreed with the proposals. Next, they were instructed to explain, in as much detail as they could, the impacts of implementing each one. Most people at this point ran into trouble. Asked once again to rate their views, they ratcheted down the intensity, so that they either agreed or disagreed less vehemently.
Sloman and Fernbach see in this result a little candle for a dark world. If we—or our friends or the pundits on CNN—spent less time pontificating and more trying to work through the implications of policy proposals, we’d realize how clueless we are and moderate our views. This, they write, “may be the only form of thinking that will shatter the illusion of explanatory depth and change people’s attitudes.”"
Posted on 2017-03-08T05:08:19+0000
Gregory Szorc's Digital Home | Better Compression with Zstandard
compression algorithm at a Mercurial developer sprint in 2015. At one end of a large table a few people were uttering expletives out of sheer excitement. At developer gatherings, that's the universal signal for
Hasnain has not yet written a summary for this.
Posted on 2017-03-08T05:00:54+0000
Google is acquiring data science community Kaggle
Sources tell us that Google is acquiring Kaggle, a platform that hosts data science and machine learning competitions. Details about the transaction remain..
Hasnain says:
Whaaaat? Am I missing something here? What could google get out of this?
Posted on 2017-03-08T04:57:55+0000
Vault7 - Home
If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at:
Hasnain says:
This is huge.
There is this quote in here which is hilarious and scary at the same time, which I'd love independent verification on.
"In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" — the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.
The CIA made these systems unclassified.
Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.
To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets."
YC’s Online Class (Sign up at StartupSchool.org)
We’re excited to announce our new online Startup School, with classes beginning on April 5. Anyone can sign up at StartupSchool.org for the 10-week massively open online course (MOOC), starting today. We want to teach everyone how to start a startup and help them along the way with guidance from peo...