Facebook’s Filter Bubble Is Getting Worse
New changes to the company’s algorithm will make the social network even more of an echo chamber. Continue reading Facebook’s Filter Bubble Is Getting Worse
Collaborate Disseminate
New changes to the company’s algorithm will make the social network even more of an echo chamber. Continue reading Facebook’s Filter Bubble Is Getting Worse
Comparing the company’s public statements about its Trending news module to its internal guidelines. Continue reading Is Facebook Lying?
What’s to be gained from reverse engineering a four-decade-old video game? As it turns out, quite a lot, and as you’ll learn from [Norbert]’s recent talk at the ViennaJS meetup, it’s not just about bringing a classic back to life.
The game in question is Kee Game’s Sprint 2, a monochrome 2D car race that allowed two players to compete head to head. The glorious Harvest Gold and Burnt Orange color scheme just screams 1970s, and it might be hard to see why this game was once a popular quarter-eater. But it was quite engaging for the day, and [Norbert] …read more
Continue reading Forty-Year-Old Arcade Game Reveals Secrets of Robot Path Planning
Like its parent company Facebook, Instagram is–dare we say it–going algorithmic. The post Like Facebook, Instagram Is About to Go—Gasp—Algorithmic appeared first on WIRED. Continue reading Like Facebook, Instagram Is About to Go—Gasp—Algorithmic
In a cryptography algorithm such as AES or DES, does the number of rounds mean same as iterating the algorithm?
Example:
c= “plaintext”;
for(int i=0;i<5; i++)
{
c = AES(c , “key”);
}
Where c holds the cipher text produced after 5 … Continue reading Is rounds in a cryptography algorithm same as iterating the algorithm?
I had asked last year about the encryption claims by the web service called https://unseen.is. The very same service that had claims of “beyond army level encryption”, “4096 bit keys” etc. This is the response from their supp… Continue reading Unseen.is encryption claims revisited with their proprietary, patented "xAES" algorithm
I stumbled upon an interview with “the grugq” in which he is talking about how hackers anonymize their traffic, i.e. hide their original ip address (- this is also what I will mean by “anonymizing” in what follows). He states… Continue reading Traffic anonymization through routing – software and algorithms
I’m going to rephrase a question I asked earlier, as I don’t think anyone understood what I meant.
Basically, I’m writing a web based password locker, which can handle multiple accounts; users can share passwords (useful if you’re in a we… Continue reading Advice on using encryption and hashing
Covert channels are normally used for communicating illegally or for some hidden communications, but I am trying to figure out what covert channel algorithms might be.
Has anyone heard of this term before and what does it mean?
How cover… Continue reading What are covert channel algorithms?
Covert channels are normally used for communicating illegally or for some hidden communications, but I am trying to figure out what covert channel algorithms might be.
Has anyone heard of this term before and what does it mean?
How cover… Continue reading What are covert channel algorithms?