Post Archive

Oct 28, 2023Open Academic Publication
Aug 08, 2023When is a network “decentralized enough?”
Aug 07, 2023AntNet: Networks from Ant Colonies
Jul 28, 2023Geolocating Users via Text Messages
Jul 15, 2023We don’t need ML, we have gzip!
Apr 08, 2023Bloom Filters
Mar 20, 2023HyperLogLog: Counting Without Counters
Mar 06, 2023Algorithmic Complexity
Feb 10, 2023Hex Grids and Cube Coordinates
Jan 17, 2023Image Dithering in Color!
Jan 16, 2023Image Dithering
Dec 03, 2022SQL for Scientists
Aug 21, 2022Torrent Health Monitoring
Jun 08, 2022Distinguishing In-Groups from Onlookers by Language Use
May 10, 2022Git and Code Versioning for Scientists
Apr 10, 2022What is Distributed Denial of Secrets?
Mar 30, 2022Predicting Friendships from SMS Metadata
Oct 09, 2021The Distributed Denial of Service at Distributed Denial of Secrets
Oct 05, 2021Dimensional Analysis, or How I Learned to Stop Worrying and Reverse-Engineered the Bomb
Jul 30, 2021Communal Ownership Online
Jul 01, 2021The Efficacy of Subreddit Bans
Jun 26, 2021Tor with VPNs (Don’t!)
May 14, 2021Reimagine the Internet Day 5: New Directions in Social Media Research
May 13, 2021Reimagine the Internet Day 4: Building Defiant Communities
May 12, 2021Reimagine the Internet Day 3: Adversarial Interoperability / Competitive Compatibility
May 11, 2021Reimagine the Internet Day 2: Misinformation, Disinformation, and Media Literacy in a Less-Centralized Social Media Universe
May 10, 2021Reimagine the Internet Day 1: Pioneering Alternative Models for Community on the Internet
May 05, 2021OurTube: Distributed Labor as Alternative to Advertisement
Mar 26, 2021Hosting Under Duress
Feb 01, 2021Color Filter Array Forensics
Nov 21, 2020Peer-to-Peer Network Models and their Implications
Oct 22, 2020RAIDs: Combining Hard Drives for Fun and Profit
Oct 21, 2020Distributed Hash Tables and Decentralized Data Storage
Sep 24, 2020Network Science for Social Modeling
Aug 19, 2020What is a Supercomputer?
Aug 13, 2020Torrents: Decentralized Data Storage
Jul 07, 2020Trustless Pursuance: Decentralized Architecture
Jun 16, 2020Information Paradigms and Radical Interfaces
Jun 12, 2020Alternative Social-Media Platforms
May 22, 2020Splintering a Pursuance
Apr 26, 2020Memory: Allocation Schemes and Relocatable Code
Mar 22, 2020Lambda Calculus: A gentle introduction and broader context
Feb 09, 2020Consensus Models in the Pursuance Paradigm
Jan 30, 2020The Soviet Cybernetic Economy
Sep 09, 2019Pursuance Group Dynamics
Jul 23, 2019Pursuance Task Management
Jul 14, 2019Pursuance Roles
Jun 24, 2019Pursuance Prototype: Email?
Jun 21, 2019Pursuance Project Initial Impressions
Jun 13, 2019Group-Grid Theory for Classifying Social Groups
May 08, 2019Steganography and Steganalysis with Fourier Transforms
Oct 23, 2018Infection and Quarantine
Jul 31, 2018Patching Registration Checks, An Introduction
Apr 22, 2018Democratic Censorship
Jan 07, 2018Hacker Community Espionage
Jan 06, 2018Alcoholics Anonymous as Decentralized Architecture
Dec 19, 2017Halftone QR Codes
Aug 19, 2017Cooperative Censorship
Aug 08, 2017Braess’s Paradox
Jul 17, 2017Merkle’s Puzzle-box Key Exchange
Jul 17, 2017Port Knocking
Jul 09, 2017Decentralized Networks
Jul 06, 2017Ruggedized Networks
Jul 05, 2017Cryptocurrency Tutorial
Jun 23, 2017Social networks should not be DAGs
Jun 14, 2017Optimizing Network Structure
Jun 06, 2017Network Coding
May 25, 2017Captcha
Mar 07, 2017SnailDoor, the Socketless Backdoor
Jan 10, 2017The Diffie-Hellman Key Exchange Made Simple
Nov 14, 2016Puddle
Aug 17, 2016Traceroute is Black Magic
Aug 16, 2016Let’s talk about touch-tone telephones!

View all posts on one page