Post Archive

Torrent Health Monitoring
Distinguishing In-Groups from Onlookers by Language Use
Git and Code Versioning for Scientists
What is Distributed Denial of Secrets?
Predicting Friendships from SMS Metadata
The Distributed Denial of Service at Distributed Denial of Secrets
Dimensional Analysis, or How I Learned to Stop Worrying and Reverse-Engineered the Bomb
Communal Ownership Online
The Efficacy of Subreddit Bans
Tor with VPNs (Don't!)
Reimagine the Internet Day 5: New Directions in Social Media Research
Reimagine the Internet Day 4: Building Defiant Communities
Reimagine the Internet Day 3: Adversarial Interoperability / Competitive Compatibility
Reimagine the Internet Day 2: Misinformation, Disinformation, and Media Literacy in a Less-Centralized Social Media Universe
Reimagine the Internet Day 1: Pioneering Alternative Models for Community on the Internet
OurTube: Distributed Labor as Alternative to Advertisement
Hosting Under Duress
Color Filter Array Forensics
Peer-to-Peer Network Models and their Implications
RAIDs: Combining Hard Drives for Fun and Profit
Distributed Hash Tables and Decentralized Data Storage
Network Science for Social Modeling
What _is_ a Supercomputer?
Torrents: Decentralized Data Storage
Trustless Pursuance: Decentralized Architecture
Information Paradigms and Radical Interfaces
Alternative Social-Media Platforms
Splintering a Pursuance
Memory: Allocation Schemes and Relocatable Code
Lambda Calculus: A gentle introduction and broader context
Consensus Models in the Pursuance Paradigm
The Soviet Cybernetic Economy
Pursuance Group Dynamics
Pursuance Task Management
Pursuance Roles
Pursuance Prototype: Email?
Pursuance Project Initial Impressions
Group-Grid Theory for Classifying Social Groups
Steganography and Steganalysis with Fourier Transforms
Infection and Quarantine
Patching Registration Checks, An Introduction
Democratic Censorship
Hacker Community Espionage
Alcoholics Anonymous as Decentralized Architecture
Halftone QR Codes
Cooperative Censorship
Braess's Paradox
Merkle's Puzzle-box Key Exchange
Port Knocking
Decentralized Networks
Ruggedized Networks
Cryptocurrency Tutorial
Social networks should not be DAGs
Optimizing Network Structure
Network Coding
SnailDoor, the Socketless Backdoor
The Diffie-Hellman Key Exchange Made Simple
Traceroute is Black Magic
Let's talk about touch-tone telephones!

View all posts on one page