Cross-VM Side Channels and Their Use to Extract Private Keys, by Yinqian Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. “This paper details the construction of an access-driven side- channel attack by which a malicious virtual machine (VM) extracts fine-grained information from a victim VM running on the same physical computer.” Yay.
How to implement dependent type theory I, II, by Andrej Bauer.
New E17 Release: ALPHA, wow.
Lebbeus Woods, 1940-2012, “Lebbeus Woods should be on the same sorts of lists as James Joyce or John Cage, a person as culturally relevant as he was scientifically suggestive, seething with ideas applicable to nearly every discipline.”
Rivers of blood in Moscow: The Great Purge personified, Spatial distribution of executions in Stalin’s Moscow
Two impromptus–or how Python helped us design our kitchen (2004), by Andrew Koenig.
ASETNIOP is a keyboard chording method for tablets, with some stenographic shortcuts. Neat.
Die Pampelmuse ist keine Grapefruit, eine kleine Zitrusfruchtkunde.
Anatomy of a hoax: The Sony Nexus X, exciting story.