| 1. | | Wealthy Black Families Still Suffer Segregation Fed Study Says (bloomberg.com) |
| 5 points by newscasta on Sept 9, 2021 | past | 4 comments |
|
| 2. | | A Potential Downside of Intermittent Fasting (nytimes.com) |
| 3 points by newscasta on Sept 30, 2020 | past |
|
| 3. | | A Gas Heist Gone Wrong (bloomberg.com) |
| 100 points by newscasta on June 26, 2019 | past | 50 comments |
|
| 4. | | How Many Tesla Model 3 Cars Have Been Made? (bloomberg.com) |
| 3 points by newscasta on Feb 14, 2018 | past |
|
| 5. | | 1Password Using Intel’s SGX to keep secrets even safer (agilebits.com) |
| 1 point by newscasta on Jan 4, 2017 | past |
|
| 6. | | Hedge Fund Is Building an Algorithmic Model From Its Employees’ Brains (wsj.com) |
| 252 points by newscasta on Dec 22, 2016 | past | 99 comments |
|
| 7. | | Open Whisper Systems Blog Reflections: The Ecosystem Is Moving (whispersystems.org) |
| 2 points by newscasta on May 11, 2016 | past |
|
| 8. | | CONIKS – easy-to-use transparent key-management system (schneier.com) |
| 2 points by newscasta on April 6, 2016 | past |
|
| 9. | | How to Hack an Election (bloomberg.com) |
| 305 points by newscasta on March 31, 2016 | past | 94 comments |
|
| 10. | | [dupe] Apple Policy on Bugs May Explain Why Hackers Would Help F.B.I (nytimes.com) |
| 4 points by newscasta on March 23, 2016 | past |
|
| 11. | | Who Needs Apple When the FBI Could Hack Terrorist iPhone Itself (bloomberg.com) |
| 7 points by newscasta on March 4, 2016 | past | 3 comments |
|
| 12. | | Mac OS X, iOS, and Flash Had the Most Discovered Vulnerabilities in 2015 (schneier.com) |
| 1 point by newscasta on Jan 12, 2016 | past |
|
| 13. | | The HTTP 500 Solution (daemonology.net) |
| 3 points by newscasta on Nov 30, 2015 | past | 1 comment |
|
| 14. | | Cutting unwanted ad injectors out of advertising (googleonlinesecurity.blogspot.com) |
| 3 points by newscasta on Sept 10, 2015 | past |
|
| 15. | | Safe from what? (daemonology.net) |
| 1 point by newscasta on Sept 3, 2015 | past |
|
| 16. | | Article Blasts Feds' Pseudoscientific Methods Establishing Dietary Guidelines (reason.com) |
| 1 point by newscasta on June 15, 2015 | past |
|
| 17. | | Ask HN: Collaboration/mailing-list service recommendations please |
| 2 points by newscasta on May 27, 2015 | past | 2 comments |
|
| 18. | | Music to Shoot You By: Taking Beethoven on a Ride-Along in FPS Games (thedailybeast.com) |
| 4 points by newscasta on Feb 27, 2015 | past |
|
| 19. | | The Bro Code – ChinaFile (chinafile.com) |
| 1 point by newscasta on Feb 13, 2015 | past |
|
| 20. | | Health evidence – Cochrane (cochrane.org) |
| 1 point by newscasta on Feb 11, 2015 | past |
|
| 21. | | Strengthening 2-Step Verification with Security Key (googleonlinesecurity.blogspot.com) |
| 220 points by newscasta on Oct 21, 2014 | past | 141 comments |
|
| 22. | | [dupe] Google Online Security Blog: Security for the People (googleonlinesecurity.blogspot.com) |
| 18 points by newscasta on Sept 18, 2014 | past | 1 comment |
|
| 23. | | Paranoid Paul is a free privacy policy tracking tool | ParanoidPaul.com (paranoidpaul.com) |
| 2 points by newscasta on Aug 19, 2014 | past |
|
| 24. | | Announcing Project Zero (googleonlinesecurity.blogspot.com) |
| 360 points by newscasta on July 15, 2014 | past | 81 comments |
|
| 25. | | NASA's Asteroid Data Hunter – Launching 03/17/14 (topcoder.com) |
| 2 points by newscasta on March 14, 2014 | past |
|
| 26. | | How I lost my $50,000 Twitter username (gizmodo.com) |
| 3 points by newscasta on Jan 29, 2014 | past |
|
| 27. | | Forward Security for Journalists (imperialviolet.org) |
| 2 points by newscasta on Dec 4, 2013 | past |
|
| 28. | | Stuxnet's Secret Twin (foreignpolicy.com) |
| 3 points by newscasta on Nov 21, 2013 | past | 2 comments |
|
| 29. | | The IT Cloud: Silver Linings (economist.com) |
| 3 points by newscasta on July 19, 2013 | past |
|
| 30. | | Free to play monetization tricks (schneier.com) |
| 1 point by newscasta on July 12, 2013 | past |
|
|
| More |