Hacker Newsnew | past | comments | ask | show | jobs | submit | michaelt's submissionslogin
1.Guarding Against Physical Attacks: The Xbox One Story (2019) (platformsecuritysummit.com)
14 points by michaelt 31 days ago | past | 6 comments
2.The Man Who Said No to Wal-Mart (2006) (fastcompany.com)
2 points by michaelt on Jan 23, 2023 | past
3.Silicon Zoo: Tiny artwork on CPU dies (fsu.edu)
189 points by michaelt on April 22, 2022 | past | 37 comments
4.Silicon Zoo: Tiny artwork on CPU dies (fsu.edu)
2 points by michaelt on Jan 19, 2022 | past
5.“I'm not sure there is an acceptable solution to the problem we are facing” (twitter.com/ballouxfrancois)
152 points by michaelt on March 16, 2020 | past | 359 comments
6.Automated Computer Time Service (ACTS) (nist.gov)
2 points by michaelt on Jan 10, 2020 | past
7.Why volt instead of volta? (2019) (hsm.stackexchange.com)
2 points by michaelt on Jan 2, 2020 | past
8.How come Public key cryptography wasn't discovered earlier? (crypto.stackexchange.com)
2 points by michaelt on May 29, 2018 | past
9.A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs (acm.org)
2 points by michaelt on Aug 2, 2016 | past
10.DRM is to give content providers leverage against creators of playback devices (plus.google.com)
2 points by michaelt on July 9, 2016 | past | 1 comment
11.Certificate Transparency and the Certificate Authority Death Penalty (mjt.me.uk)
15 points by michaelt on March 23, 2016 | past
12.Some subjective opinions on software design (mjt.me.uk)
1 point by michaelt on Feb 22, 2016 | past
13.The smallest 256x256 single-color PNG file, and where you've seen it (mjt.me.uk)
6 points by michaelt on Oct 25, 2015 | past
14.Contraction Hierarchies path-finding algorithm, illustrated using Three.js (mjt.me.uk)
11 points by michaelt on June 15, 2015 | past
15.Falsehoods programmers believe about addresses (mjt.me.uk)
144 points by michaelt on May 30, 2013 | past | 128 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: