menu Menu
4 articles filed in
Hacking
This is the category description. In this theme you can attach a featured image for every category. Also you can set a default template for all categories and select a specific one in the categories that you want to have a different look.
Previous page Next page

Algorithms Supercharged Gerrymandering. We Should Use Them to Fix it.

A new suite of open source redistricting software can help citizens reclaim democracy.

Today, the Supreme Court will hear oral arguments for Gill v. Whitford, in which the state of Wisconsin will argue that congressional redistricting practices are not subject to judicial oversight. At the core of this hearing is whether partisan gerrymandering—a tactic used by political parties to redraw congressional voting districts so that the voting power within those […]

Continue reading


Who Is Satoshi Nakamoto, the Creator of Bitcoin?

Like a frustrating episode of Lost, there’s one too many clues and few, if any, answers.

For all of Bitcoin’s fabled transparency, a key piece of this bubblicious puzzle remains elusively opaque. Who the hell is Satoshi Nakamoto? Like a frustrating episode of Lost, there’s one too many clues and few if any answers. Satoshi, of course, is the one who started it all, unleashing his concept of a cryptographic, self-regulating […]

Continue reading


What the Near Future Is Actually Going to Look Like.

The biggest lie about the future is that it's going to look much different from today.

The biggest lie about the future is that it’s going to look much different from today. I mean, The Jetsons and Futurama are one thing, but in near-future portrayals—those shown in goofball blockbusters like I, Robot and Minority Report—the world is given a glossy, high-tech makeover. These futuristic landscapes suggest we’re about to see a […]

Continue reading


'Black Box' Software Could Be the Future of Cryptography

“Traditional encryption is about securing data” said Dr. Dan Boneh

Imagine trying to throw a dart at a bullseye that’s 200 feet away with only your bare hands. Now, add a blindfold to the equation. Theoretically, it might be possible. But practically, it’s pretty much impossible—about the same odds as trying to break a new form of software protection called indistinguishability obfuscation. Indistinguishability obfuscation—similar in […]

Continue reading



Previous page Next page

keyboard_arrow_up