Post Overview
-
Download
9 years agoDownload+21 21 0Difficulty Control for Blockchain-Based Consensus Systems
Crypto-currencies like Bitcoin have recently attracted a lot of interest. A crucial ingredient into such systems is the \mining" of a Nakamoto blockchain. We model mining as a Poisson process with time-dependent intensity and use this model to ...
-
Video/Audio
9 years ago+2 2 0Mega Drive - 198XAD [Full Album]
-
Video/Audio
9 years ago+17 17 0Kavinsky - Outrun
-
Download
9 years agoDownload+2 2 0The History of Mobile Augmented Reality: Developments in Mobile AR over the last almost 50 years [Technical Report] [PDF]
This document summarizes the major milestones in mobile Augmented Reality between 1968 and 2014. Mobile Augmented Reality has largely evolved over the last decade, as well as the interpretation itself of what is Mobile Augmented Reality. ...
-
Download
9 years agoDownload+2 2 0Cookies Lack Integrity: Real-World Implications [2015] [PDF]
A cookie can contain a “secure” flag, indicating that it should be only sent over an HTTPS connection. Yet there is no corresponding flag to indicate how a cookie was set: attackers who act as a man-in-the-midddle even temporarily on an HTTP session ...
-
Video/Audio
9 years ago+2 2 0Com Truise - Cyanide Sisters [Full album]
-
Download
9 years agoDownload+1 1 0HORNET: High-speed Onion Routing at the Network Layer [PDF] [2015]
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide ra ...
-
Video/Audio
9 years ago+2 2 0Lazerhawk ~ Redline Full Album
-
Download
9 years agoDownload+1 1 0Transaction Remote Release (TRR): A New Anonymization Technology for Bitcoin [PDF] [2015]
The anonymity of the Bitcoin system has some shortcomings. Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN) are two important methods of deanonymizing bitcoin transactions. Nowadays, there are some anonymization ...
-
Video/Audio
9 years ago+1 1 0Miami Nights 1984 - Turbulence [Full album]
-
Video/Audio
9 years ago+1 1 0NSFW Perturbator - "Dangerous Days" [Full Album - Official]
-
Download
9 years agoDownload+1 1 0De-anonymizing Programmers via Code Stylometry [PDF] [2015]
Source code authorship attribution is a significant privacy threat to anonymous code contributors. However, it may also enable attribution of successful attacks from code left behind on an infected system, or aid in resolving copyright, copyleft, and ...
-
Text Post
9 years ago+7 7 0Random Tribe Discovery
On other sites, it was the main way for me to find the equivalent of tribes, that I didn't know existed, were much smaller in size, where I wouldn't necessarily know what their name would be called. Then again, I have used it to discover music genres, so it is asking to be able to continue a specific habit I developed in on other sites, so take it as you will.
EDIT: And it possibly fit near the new/all buttons at the top, or at least be part of a "discovery" system.
-
Video/Audio
9 years ago+2 2 0Best of Danger (Continuous Mix | High Quality)
Some electronic tunes by Danger with a heavy outrun/cyberpunk feel.
-
Analysis
9 years agoAnalysis+1 1 0Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication
Abstract —Widely-deployed encryption-based security prevents unauthorized decoding, but does not ensure undetectability of communication. However, covert, or low probability of detection/intercept (LPD/LPI) communication is crucial in many scenarios ...