RSS

Com­puter Security

TagLast edit: 19 Apr 2021 5:45 UTC by [Error communicating with LW2 server]

On De­stroy­ing the World

Chris_Leong28 Sep 2020 7:38 UTC
67 points
86 comments4 min readLW link

[Question] In soft­ware en­g­ineer­ing, what are the up­per limits of Lan­guage-Based Se­cu­rity?

MakoYass27 Dec 2020 5:50 UTC
12 points
5 comments1 min readLW link

Work on Se­cu­rity In­stead of Friendli­ness?

Wei_Dai21 Jul 2012 18:28 UTC
49 points
107 comments2 min readLW link

Se­cu­rity Mind­set and Or­di­nary Paranoia

Eliezer Yudkowsky25 Nov 2017 17:53 UTC
74 points
21 comments29 min readLW link

The dan­ger of er­ror descriptions

gistya25 Mar 2021 20:05 UTC
−1 points
2 comments3 min readLW link

Scry­ing for out­comes where the prob­lem of deep­fakes has been solved

MakoYass15 Apr 2019 4:45 UTC
26 points
10 comments4 min readLW link

Es­ti­mat­ing the con­se­quences of de­vice de­tec­tion tech

Jsevillamol8 Jul 2018 18:25 UTC
24 points
4 comments7 min readLW link

Uniker­nels: No Longer an Aca­demic Exercise

Martin Sustrik23 Oct 2018 11:40 UTC
27 points
1 comment3 min readLW link
(250bpm.com)

On See­ing Through ‘On See­ing Through: A Unified The­ory’: A Unified Theory

gwern15 Jun 2019 18:57 UTC
24 points
0 comments1 min readLW link
(www.gwern.net)

Zoom’s se­cu­rity is not that bad

lc5 Apr 2020 11:31 UTC
5 points
16 comments4 min readLW link

Com­puter se­cu­rity story

Perplexed17 Feb 2011 0:26 UTC
5 points
30 comments1 min readLW link

Se­cu­rity Mind­set and the Lo­gis­tic Suc­cess Curve

Eliezer Yudkowsky26 Nov 2017 15:58 UTC
67 points
45 comments20 min readLW link

Op­ti­mal User-End In­ter­net Se­cu­rity (Or, Ra­tional In­ter­net Brows­ing)

Arkanj3l9 Sep 2011 18:23 UTC
2 points
23 comments1 min readLW link

Neu­ral pro­gram syn­the­sis is a dan­ger­ous technology

syllogism12 Jan 2018 16:19 UTC
9 points
6 comments2 min readLW link
No comments.