Cross-VM Side Channels and Their Use to Extract Private Keys,
by Yinqian Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart.
“This paper details the construction of an access-driven side-
channel attack by which a malicious virtual machine (VM)
extracts fine-grained information from a victim VM running
on the same physical computer.” Yay.
How to implement dependent type theory I,
by Andrej Bauer.
New E17 Release: ALPHA, wow.
Lebbeus Woods, 1940-2012,
“Lebbeus Woods should be on the same sorts of lists as James Joyce or
John Cage, a person as culturally relevant as he was scientifically
suggestive, seething with ideas applicable to nearly every
Rivers of blood in Moscow: The Great Purge personified,
Spatial distribution of executions in Stalin’s Moscow
Two impromptus–or how Python helped us design our kitchen (2004), by
ASETNIOP is a keyboard chording method for tablets, with some
stenographic shortcuts. Neat.
Die Pampelmuse ist keine Grapefruit, eine kleine Zitrusfruchtkunde.
Anatomy of a hoax: The Sony Nexus X, exciting story.
Cartesian Closed Comic