Disclaimer:

Some of the site's links could be classified as NSFW, NSFL, obscene, offensive, dark or disturbing.
Site also uses cookies to provide basic functionality.

OK
http://ponyfoo.com/p/2
Mon 19 Feb 2024 (1 week ago)
Pony Foo — Web platform, JavaScript, modularity, front-end architecture, performance, and more!
like my changes? Will the PR meet their expectations ? How much scrutiny can I expect? open-source code-review Aug 3rd , 2016 12m
https://invertedpassion.com/deconstructing-startup-decks-spext-google-docs-for-voice-data
Mon 12 Feb 2024 (2 weeks ago)
Deconstructing startup decks: Spext (Google Docs for voice data) - Inverted Passion
and any unsaid assumptions that may not hold true upon closer scrutiny. Not really sure about this slide. My guess is that this
https://blog.jgc.org/2007
Mon 12 Feb 2024 (2 weeks ago)
John Graham-Cumming's blog: 2007
it, or subject the mails sent on the connection to extra scrutiny. If you can identify a good connection it can bypass spam
it, or subject the mails sent on the connection to extra scrutiny. If you can identify a good connection it can bypass spam
http://whale.to/c/kennedy_q.html
Mon 19 Feb 2024 (1 week ago)
Robert F. Kennedy Jr.quotes
industry from lawsuits combined with the absence of political and press scrutiny, have emboldened the CDC to sanction increasingly reckless conduct by vaccine
high, so wobbly and so fragile that a light breeze of scrutiny will bring the whole thing tumbling down. You can accomplish the
https://blog.cryptographyengineering.com/2013/09
Mon 12 Feb 2024 (2 weeks ago)
September 2013 – A Few Thoughts on Cryptographic Engineering
Nonsense. A single obsolete hash based generator (FIPS 186) was under scrutiny — and fixed. The NIST SP800-90 draft in which Dual_EC appeared
were in vogue Say what? and hash-based RNG was under scrutiny. Nonsense. A single obsolete hash based generator (FIPS 186) was under
an accepted and publicly scrutinized standard. And every bit of public scrutiny said the same thing: this thing is broken! Grab your children
Of the libraries above, Microsoft is probably due for the most scrutiny. While Microsoft employs good (and paranoid!) people to vet their algorithms,
http://ayende.com/blog/archive/2017/6
Mon 12 Feb 2024 (2 weeks ago)
Ayende @ Rahien
bunch of other stuff that was found under this level of scrutiny. But the original problem persisted, quite annoyingly. Eventually, we tracked it
http://blog.rongarret.info/search?updated-max=2008-08-05T13:54:00-07:00&max-results=50
Fri 23 Feb 2024 (1 week ago)
Rondam Ramblings
crack in the earth's crust." Does this claim stand up to scrutiny? Well, no, it doesn't. Unfortunately for Parsons, we have an exceptionally
http://steve-yegge.blogspot.com/2008/10
Mon 19 Feb 2024 (1 week ago)
Stevey's Blog Rants: October 2008
vine towards the lower back right corner, keeping it under close scrutiny at all times. This excursion, from the halfway point to the
that reasoning about them can take days or weeks of microscopic scrutiny, like my fish swimming along his vine. And we can just
https://blog.cryptographyengineering.com/2012/01
Mon 12 Feb 2024 (2 weeks ago)
January 2012 – A Few Thoughts on Cryptographic Engineering
t used frequently, and doesn’t receive the same level of scrutiny as the main TLS code. Thus — two nearly identical implementations, subject
https://blog.cryptographyengineering.com/2011/12
Mon 12 Feb 2024 (2 weeks ago)
December 2011 – A Few Thoughts on Cryptographic Engineering
now out there, and no, I’m not taking credit. But scrutiny is generally a good thing.) Anyway, we knew that there were