A journey into cameras, RAW, and a look at what makes ProRAW so special - and how it could change how everyone shoots and edits on iPhone.
Some really good technical details in this post.
Well that doesn't look too good.
Over the last two years, though, RPKI has gained some real momentum, and is now in use by ISPs like AT&T, Telia, NTT, and Cogent. On Monday, the European network service provider RETN announced that it has implemented RPKI. And in November, Google completed RPKI registration for more than 99 percent of its routes.
Update: Microsoft also announced last week it's signed all of its BGP routes.
This report documents the widespread adoption of [mobile device forensic tools] by law enforcement in the United States. Based on 110 public records requests to state and local law enforcement agencies across the country, our research documents more than 2,000 agencies that have purchased these tools, in all 50 states and the District of Columbia. We found that state and local law enforcement agencies have performed hundreds of thousands of cellphone extractions since 2015, often without a warrant. To our knowledge, this is the first time that such records have been widely disclosed.
Every American is at risk of having their phone forensically searched by law enforcement.
Some very common-sense policy recommendations about how to balance law-enforcement and 4th Amendment concerns at the end.
[For] anyone at Twitter who was depending on the network of tweets being a Directed Acyclic Graph, I'm so terribly sorry.
Today, DeepMind announced that it has seemingly solved one of biology's outstanding problems: how the string of amino acids in a protein folds up into a three-dimensional shape that enables their complex functions. It's a computational challenge that has resisted the efforts of many very smart biologists for decades, despite the application of supercomputer-level hardware for these calculations. DeepMind instead trained its system using 128 specialized processors for a couple of weeks; it now returns potential structures within a couple of days.
The original name of the company was ""><SCRIPT SRC=HTTPS://MJT.XSS.HT> LTD". By beginning the name with a quotation mark and chevron, any site which failed to properly handle the HTML code would have mistakenly thought the company name was blank, and then loaded and executed a script from the site XSS Hunter, which helps developers find cross-site scripting errors.
An amazing analysis of the fundraising of each candidate by zip code.
[W]hen we do talk about power, we often talk about it strictly as something negative—something dangerous to be avoided—rather than as a gift to be stewarded. [...]
If power is irredeemably negative, none of us would want to admit we have it—which means none of us will be accountable for the power we have. [...]
But if power is a gift, then we can be accountable for its proper use—to its Giver, and to one another.