- The Mutable Web -- rewriting Twitter's web styling is hard but not impossible, and makes the author muse on the value of the mutable web. Transparency and introspection are fundamental to the way the web works, and obfuscation, intentional or not, can't really change that.
- Estimating the Success of Re-Identifications in Incomplete Data Sets Using Generative Models (Nature) -- Using our model, we find that 99.98% of Americans would be correctly re-identified in any data set using 15 demographic attributes. Reminds me of the finding (claim?) that it only takes 8 (12? citation needed) words to uniquely identify a text.
- Picat -- a simple, and yet powerful, logic-based multi-paradigm programming language aimed for general-purpose applications. Picat is a rule-based language, in which predicates, functions, and actors are defined with pattern-matching rules. Interesting take on a language, which made more sense after I read this Hacker News comment.
- Security Risks of Government Hacking (Stanford Cyberlaw) -- This paper addresses six main ways that government hacking can raise broader computer security risks. These include: creating a disincentive to disclose vulnerabilities that should be disclosed because other attackers might independently discover them; cultivating a market for surveillance tools and 0-days; risking that vulnerabilities exploited by the malware will be identified and used by other attackers, as a result of either law enforcement’s losing control of the hacking tools, or discovery by outsiders of law enforcement’s hacking activity; creating an incentive to push for less-secure software and standards; and risking that the malware will affect innocent users.
Article image: Four short links