As you’re probably already aware — the Electronic Frontier Foundation (EFF) is the world’s leading nonprofit organization currently working day and night to defend your civil liberties in and around the internet.
The team at Hacker Noon loves the EFF’s work (long time), and wanted to find a way to contribute to the worthy causes of user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. (Learn more at eff.org.)
$10 from every limited edition Hacker Noon shirt sold goes to Electronic Frontier Foundation to help protect the cornerstones of our internet freedoms: privacy, free expression, and innovation.
and now: october’s most read on hacker noon
The technologies that enable bubbles are always new, but the underlying social dynamics are not. The open and permissionless nature of blockchains allows anyone to co-opt them. Thus, blockchains enabled multiple social forces, all interacting in the same network, all reified under the name “the ICO bubble.”
Honestly assessing what you do and don’t know shows humility and maturity.
In the last post I wrote that to beat complexity you need to split the monolith. In this post I’ll describe the wrong ways of doing this. I can go even further and call the following ways an anti-patterns of monolith splitting, or anti-patterns of service boundaries defining.
On Friday, Chris Palmer announced the intent to deprecate HTTP Public Key Pinning (HPKP) in Chrome and remove the feature entirely in future. In this post, we’ll look at the problems with public key pinning, and how Certificate Transparency has become the more favoured method of avoiding maliciously issued certificates.
✳️ WearOS pitfalls by @drodil
At the time of writing there are around 40 different models that run WearOS on the market. I got my first of those models, Mobvoi Ticwatch Pro, just a week ago.
“I think the history of science has shown that valuable consequences often proliferate from simple curiosity.” — Claude Shannon
Is Elon capable of inventing Bitcoin? Probably.
✳️ Why Choosing a Strategic Partner Is Your Best Bet for Digital Transformation Success by @rgujrati
Deep neural networks have many, many learnable parameters that are used to make inferences. Often, this poses a problem in two ways: Sometimes, the model does not make very accurate predictions. It also takes a long time to train them. This post talks about increasing accuracy while also reducing training time using two very novel ways.
✳️ Reduce your Crypto portfolio’s risk exposure with one simple trick — Fiat as an asset by @iliyazaki
The strategy listed below is geared towards first, reducing losses during a bear market. Next, realising returns during a bull market and lastly, ensuring long term survival in the market.
✳️ Why we rewrote Lua in JS by @giann
There is some confusion as to what a “thesis-driven approach” even describes in venture investing. While Wikipedia helps us in defining the term as “a concept or idea that can be falsified by various (scientific) methods“, the application of this process may take two forms in venture.
Starting software development may seem too hard and cumbersome task for many. Actually you only need a computer and a heck lot of interest in software development to get started.