How to program a device that plays with random numbers

With a little basic coding, Hannah Joshua shows you how to make a truly smart messaging device that can dispense advice whenever you shake it Source: https://www.newscientist.com/article/mg24232330-600-how-to-program-a-device-that-plays-with-random-numbers/?utm_campaign=RSS%7CNSNS&utm_source=NSNS&utm_medium=RSS&utm_content=home…

Apple Introduces Privacy-Focused ‘Sign in With Apple’ Button For Sites and Apps

Apple today announced a “Sign in with Apple” button — that is similar to sign-in buttons from Twitter, Facebook or Google that allow users to quickly login to a range of services using their social media account. But unlike any existing solution, Apple is focusing on privacy. From a report: More importantly, you can choose to hide your email address, and…

Ask Slashdot: What To Do When Your Certificate Authority Suddenly Revokes Your Cert?

Long-time Slashdot reader rastos1 works for a mid-size software company that for many decades has been developing CAD-CAM software for the textile industry. But last weekend their code-signing certificate was revoked — and they’re looking for advice. On Monday morning we woke up to phones ringing from confused customers unable to launch our software. This has hit mostly Java applications launched…

‘How I Cheated On My Microsoft Job Interview’

Robert Sweeney spent 10 years working as a software engineer at Microsoft and Netflix, before becoming founder and CEO of the software development agency Facet. This week he blogged about how he cheated on his 2004 interview for a job at Microsoft. It was his first job interview ever, when he was still a college senior majoring in computer science, and…

Academics Improve SHA-1 Collision Attack, Make It Actually Dangerous

An anonymous reader writes: “Attacks on the SHA-1 hashing algorithm just got a lot more dangerous last week with the discovery of the first-ever ‘chosen-prefix collision attack,’ a more practical version of the SHA-1 collision attack first carried out by Google two years ago,” reports ZDNet. Google’s original research allowed attackers to force duplicates for specific files, but this process was…

Why Knights Fought Snails in Illuminated Medieval Manuscripts

The snail may leave a trail of slime behind him, but a little slime will do a man no harm… whilst if you dance with dragons, you must expect to burn. – George R. R. Martin, The Mystery Knight As any Game of Thrones fan knows, being a knight has its downsides. It isn’t all […]

Why Knights Fought Snails in Illuminated…

A Dictionary of Words Invented to Name Emotions We All Feel, But Don’t Yet Have a Name For: Vemödalen, Sonder, Chrysalism & Much More

Philosophers have always distrusted language for its slipperiness, its overuse, its propensity to deceive. Yet many of those same critics have devised the most inventive terms to describe things no one had ever seen. The Philosopher’s Stone, the aether, miasmas—images that made the ineffable concrete, if still invisibly gaseous. It’s important for us to see […]

A Dictionary of Words Invented to…