Hacker Newsnew | past | comments | ask | show | jobs | submit | bdhe's submissionslogin
1.Ask HN: Why is the sender chat box always on the right?
5 points by bdhe 8 months ago | past | 9 comments
2.Ask HN: Useful tips, tricks, and mindset changes navigating frothy organizations
1 point by bdhe 11 months ago | past
3.Ask HN: Good articles or books to understand the current zeitgeist?
11 points by bdhe on Jan 23, 2025 | past | 16 comments
4.Ask HN: What are Larry Page and Sergey Brin working on these days?
38 points by bdhe on Dec 9, 2022 | past | 11 comments
5.Facebook is conducting quiet layoffs (businessinsider.com)
8 points by bdhe on Oct 4, 2022 | past
6.Google is making it easier for AI developers to keep users’ data private (theverge.com)
2 points by bdhe on March 6, 2019 | past
7.Comcast Has About 76 Lobbyists Working Washington On The Merger. This is Why. (time.com)
7 points by bdhe on April 29, 2014 | past
8.France Accuses US of Using Flame Malware to Hack President's Network (threatpost.com)
1 point by bdhe on Nov 21, 2012 | past
9.CRIME Attack Uses Compression Ratio of TLS Requests as Side Channel (threatpost.com)
2 points by bdhe on Sept 13, 2012 | past
10.Aldous Huxley's letter to Orwell on "1984." (lettersofnote.com)
17 points by bdhe on March 6, 2012 | past | 3 comments
11.MITx, MIT's online education initiative launches its prototype course. (mitx.mit.edu)
4 points by bdhe on Feb 15, 2012 | past
12.A Senseless Conversation (sci-fi short on the Turing Test) (sites.google.com)
2 points by bdhe on Feb 6, 2012 | past
13.Fields medal winner Tim Gowers on online review systems (gowers.wordpress.com)
3 points by bdhe on Feb 2, 2012 | past
14.The Unreasonable Effectiveness of Mathematics in the Natural Sciences (1960) (dartmouth.edu)
8 points by bdhe on Jan 30, 2012 | past
15.The Right to Read by Richard Stallman. (gnu.org)
8 points by bdhe on Jan 24, 2012 | past
16.Authentication by "Cognitive Footprint". (schneier.com)
2 points by bdhe on Jan 23, 2012 | past
17.Visualizing how a population grows to 7 billion. (npr.org)
51 points by bdhe on Oct 31, 2011 | past | 14 comments
18.Researchers lock down Android to keep data from walking out the door (arstechnica.com)
2 points by bdhe on Oct 17, 2011 | past
19.Copyright czar cozied up to Big Content, e-mails show (arstechnica.com)
6 points by bdhe on Oct 14, 2011 | past
20.Burglar tips off police about a bigger crime. (schneier.com)
2 points by bdhe on Oct 14, 2011 | past
21.Beautiful 3D visualization of population density using WebGL (data-arts.appspot.com)
5 points by bdhe on Oct 13, 2011 | past | 1 comment
22.Research shows that starlings recognize context-free grammars. (nature.com)
3 points by bdhe on Oct 5, 2011 | past
23.US, Aus, Canada, Japan, Morocco, New Zealand, Singapore, and S. Korea sign ACTA (arstechnica.com)
124 points by bdhe on Oct 4, 2011 | past | 34 comments
24.Isaac Asimov on Security Theatre. (schneier.com)
176 points by bdhe on Oct 4, 2011 | past | 46 comments
25.An example of security theatre in a 1956 Asimov short story. (decrepitoldfool.com)
2 points by bdhe on Oct 3, 2011 | past
26.The phenomena of eventual counter-examples. (mathoverflow.net)
2 points by bdhe on Oct 3, 2011 | past
27.Leisure: Don Knuth's 1984 article on the complexity of songs [pdf] (utexas.edu)
3 points by bdhe on Oct 2, 2011 | past
28.Opera security blog: The "BEAST" SSL/TLS issue. (opera.com)
1 point by bdhe on Sept 28, 2011 | past
29.First solutions for recently announced BEAST SSL/TLS vulnerability. (h-online.com)
1 point by bdhe on Sept 26, 2011 | past
30.Tesla v. Einstein: Transcending the speed of light. (writingriffs.com)
2 points by bdhe on Sept 23, 2011 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: