Dec 11, 2024 | What is NP? Why is NP? |
Oct 28, 2023 | Open Academic Publication |
Aug 08, 2023 | When is a network “decentralized enough?” |
Aug 07, 2023 | AntNet: Networks from Ant Colonies |
Jul 28, 2023 | Geolocating Users via Text Messages |
Jul 15, 2023 | We don’t need ML, we have gzip! |
Apr 08, 2023 | Bloom Filters |
Mar 20, 2023 | HyperLogLog: Counting Without Counters |
Mar 06, 2023 | Algorithmic Complexity |
Feb 10, 2023 | Hex Grids and Cube Coordinates |
Jan 17, 2023 | Image Dithering in Color! |
Jan 16, 2023 | Image Dithering |
Dec 03, 2022 | SQL for Scientists |
Aug 21, 2022 | Torrent Health Monitoring |
Jun 08, 2022 | Distinguishing In-Groups from Onlookers by Language Use |
May 10, 2022 | Git and Code Versioning for Scientists |
Apr 10, 2022 | What is Distributed Denial of Secrets? |
Mar 30, 2022 | Predicting Friendships from SMS Metadata |
Oct 09, 2021 | The Distributed Denial of Service at Distributed Denial of Secrets |
Oct 05, 2021 | Dimensional Analysis, or How I Learned to Stop Worrying and Reverse-Engineered the Bomb |
Jul 30, 2021 | Communal Ownership Online |
Jul 01, 2021 | The Efficacy of Subreddit Bans |
Jun 26, 2021 | Tor with VPNs (Don’t!) |
May 14, 2021 | Reimagine the Internet Day 5: New Directions in Social Media Research |
May 13, 2021 | Reimagine the Internet Day 4: Building Defiant Communities |
May 12, 2021 | Reimagine the Internet Day 3: Adversarial Interoperability / Competitive Compatibility |
May 11, 2021 | Reimagine the Internet Day 2: Misinformation, Disinformation, and Media Literacy in a Less-Centralized Social Media Universe |
May 10, 2021 | Reimagine the Internet Day 1: Pioneering Alternative Models for Community on the Internet |
May 05, 2021 | OurTube: Distributed Labor as Alternative to Advertisement |
Mar 26, 2021 | Hosting Under Duress |
Feb 01, 2021 | Color Filter Array Forensics |
Nov 21, 2020 | Peer-to-Peer Network Models and their Implications |
Oct 22, 2020 | RAIDs: Combining Hard Drives for Fun and Profit |
Oct 21, 2020 | Distributed Hash Tables and Decentralized Data Storage |
Sep 24, 2020 | Network Science for Social Modeling |
Aug 19, 2020 | What is a Supercomputer? |
Aug 13, 2020 | Torrents: Decentralized Data Storage |
Jul 07, 2020 | Trustless Pursuance: Decentralized Architecture |
Jun 16, 2020 | Information Paradigms and Radical Interfaces |
Jun 12, 2020 | Alternative Social-Media Platforms |
May 22, 2020 | Splintering a Pursuance |
Apr 26, 2020 | Memory: Allocation Schemes and Relocatable Code |
Mar 22, 2020 | Lambda Calculus: A gentle introduction and broader context |
Feb 09, 2020 | Consensus Models in the Pursuance Paradigm |
Jan 30, 2020 | The Soviet Cybernetic Economy |
Sep 09, 2019 | Pursuance Group Dynamics |
Jul 23, 2019 | Pursuance Task Management |
Jul 14, 2019 | Pursuance Roles |
Jun 24, 2019 | Pursuance Prototype: Email? |
Jun 21, 2019 | Pursuance Project Initial Impressions |
Jun 13, 2019 | Group-Grid Theory for Classifying Social Groups |
May 08, 2019 | Steganography and Steganalysis with Fourier Transforms |
Oct 23, 2018 | Infection and Quarantine |
Jul 31, 2018 | Patching Registration Checks, An Introduction |
Apr 22, 2018 | Democratic Censorship |
Jan 07, 2018 | Hacker Community Espionage |
Jan 06, 2018 | Alcoholics Anonymous as Decentralized Architecture |
Dec 19, 2017 | Halftone QR Codes |
Aug 19, 2017 | Cooperative Censorship |
Aug 08, 2017 | Braess’s Paradox |
Jul 17, 2017 | Merkle’s Puzzle-box Key Exchange |
Jul 17, 2017 | Port Knocking |
Jul 09, 2017 | Decentralized Networks |
Jul 06, 2017 | Ruggedized Networks |
Jul 05, 2017 | Cryptocurrency Tutorial |
Jun 23, 2017 | Social networks should not be DAGs |
Jun 14, 2017 | Optimizing Network Structure |
Jun 06, 2017 | Network Coding |
May 25, 2017 | Captcha |
Mar 07, 2017 | SnailDoor, the Socketless Backdoor |
Jan 10, 2017 | The Diffie-Hellman Key Exchange Made Simple |
Nov 14, 2016 | Puddle |
Aug 17, 2016 | Traceroute is Black Magic |
Aug 16, 2016 | Let’s talk about touch-tone telephones! |