Hacker News new | past | comments | ask | show | jobs | submit | ldayley's submissions login
1. Labels Want to Prevent 'Taylor's Version' Re-Recordings from Happening Again (billboard.com)
6 points by ldayley on Oct 31, 2023 | past
2. New York City bids an official farewell to its last public pay phone (npr.org)
1 point by ldayley on May 24, 2022 | past
3. Sweeping legal ruling orders ISPs to block pirate sites (theverge.com)
12 points by ldayley on May 6, 2022 | past | 3 comments
4. After criticism, Apple to only seek abuse images flagged in multiple nations (reuters.com)
263 points by ldayley on Aug 13, 2021 | past | 240 comments
5. Kardashev Scale (wikipedia.org)
8 points by ldayley on May 6, 2021 | past | 5 comments
6. Causal Inference: The Mixtape (scunning.com)
1 point by ldayley on April 2, 2021 | past
7. How Much of the Hitchhiker’s Guide to the Galaxy Can You Fit on a QR Code? (mbuffett.com)
1 point by ldayley on March 29, 2021 | past
8. Raspberry Pi Unveils 12.3MP Camera Module with Interchangeable Lenses (petapixel.com)
2 points by ldayley on May 1, 2020 | past
9. Sony’s New SDK Lets Developers Make Their Own Remote Camera Solutions (petapixel.com)
1 point by ldayley on Feb 12, 2020 | past
10. Empathy (themargins.substack.com)
1 point by ldayley on Sept 17, 2019 | past
11. Using ML for Automated RF Side-Channel Attack Classification (leveldown.de)
35 points by ldayley on Sept 9, 2019 | past | 3 comments
12. iOS Jailbreaks Post-Exploitation (quarkslab.com)
1 point by ldayley on Sept 14, 2018 | past
13. Social Relationships and Mortality Risk [PDF] (plos.org)
1 point by ldayley on May 1, 2018 | past
14. Automatically Stealing Password Hashes with Microsoft Outlook and OLE (cmu.edu)
1 point by ldayley on April 10, 2018 | past
15. SEC reveals it was hacked, information may have been used for illegal trades (washingtonpost.com)
2 points by ldayley on Sept 21, 2017 | past
16. 2009 CIA Data Breach Revealed for the First Time (buzzfeed.com)
5 points by ldayley on July 13, 2017 | past
17. Bypassing OTR Signature Verification to Steal iCloud Keychain Secrets (medium.com/longtermsec)
2 points by ldayley on May 8, 2017 | past
18. E2EMail research project has left the nest (googleblog.com)
5 points by ldayley on Feb 24, 2017 | past
19. Traffic Lights with Auction-Based Controllers (Google Research)[pdf] (arxiv.org)
3 points by ldayley on Feb 7, 2017 | past
20. Defending against Rowhammer in the Linux kernel (lwn.net)
118 points by ldayley on Oct 28, 2016 | past | 45 comments
21. How to steal $2,999.99 in 2 minutes with Venmo and Siri (martinvigo.com)
1 point by ldayley on Aug 2, 2016 | past
22. Peter Thiel's Commencement Address to Hamilton College 2016 Grads (youtube.com)
2 points by ldayley on May 23, 2016 | past
23. Abundance (thereformedbroker.com)
4 points by ldayley on Feb 25, 2016 | past
24. An Assessment of the Economic Benefits Associated with Encryption [pdf] (niskanencenter.org)
2 points by ldayley on Nov 9, 2015 | past
25. Apple Music’s Functionality Failure (lefsetz.com)
2 points by ldayley on Sept 25, 2015 | past | 1 comment
26. Exposure to Diverse Information on Facebook (fb.com)
3 points by ldayley on May 7, 2015 | past
27. For the First Time in 30 Years US Unemployment Fell in Every State in 2014 (wsj.com)
2 points by ldayley on March 4, 2015 | past
28. Beware the Pretty People (techcrunch.com)
101 points by ldayley on March 1, 2015 | past | 102 comments
29. Why Do Many Reasonable People Trust Science? (thesocietypages.org)
2 points by ldayley on Feb 23, 2015 | past
30. Using Google Cloud Platform for Security Scanning (googleonlinesecurity.blogspot.com)
70 points by ldayley on Feb 19, 2015 | past | 2 comments

Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: