Bibliography (115):

  1. Weird Machines, Exploitability, and Provable Unexploitability

    [Transclude the forward-link's context]

  2. Surprisingly Turing-Complete

  3. 2012-sistery-tryingtoseethrough.html

  4. Falsehoods Programmers Believe About X

  5. The Law of Leaky Abstractions

  6. Technology Forecasting: The Garden of Forking Paths

  7. The Security Mindset

  8. https://www.tbray.org/ongoing/When/202x/2022/06/02/Dangerous-Gift

  9. https://x.com/_JeanLannes/status/1687649736356982784

  10. Appendix F: Personal Observations on the Reliability of the Shuttle

  11. The Complete Works of Ralph Waldo Emerson: Natural History of Intellect, and Other Papers [Vol. 12]

  12. An Atomist Illustration In Aristotle

  13. Thread by @Gankro: "Zelda Speedrunners Are Now at the Point Where They'Re Attacking the Memory Allocator to Go Fast—Repeatedly Leaking Memory to Get the Heap […]"

  14. Overload Glitch (Halo 3)

  15. How Mario 64 Was Solved Using Parallel Universes—Super Mario 64 Tool-Assisted Speedrun Explained

  16. A Burglar’s Guide to the City

  17. Confessions of a Master Jewel Thief

  18. Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker

  19. Nakatomi Space

  20. Seven Types of Locked Room Mystery (Part 1/5)

  21. Umineko: The Hopium Of The Magics

  22. Willard's Truths

  23. The Search for the Perfect Door

  24. Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks

  25. Safecracking for the Computer Scientist

  26. Toward a Broader View of Security Protocols

  27. https://x.com/mattblaze/status/1553254965870841856

  28. Attention and awareness in stage magic: turning tricks into research

  29. Teller Reveals His Secrets: The smaller, quieter half of the magician duo Penn & Teller writes about how magicians manipulate the human mind

  30. Teller (Of Penn & Teller) on Revealing Magic Tricks

  31. Notes on a Strange World: Houdini’s Impossible Demonstration

  32. Littlewood’s Law and the Global Media

  33. Tripping on nothing: placebo psychedelics and contextual factors

  34. Playing to Win

  35. Hacker Humor

  36. Playing to Win Overview

  37. Formal Theory of Creativity & Fun & Intrinsic Motivation (1990–2010)

  38. The Dematerialization of Matter

  39. Heisenberg’s Uncertainty Principle and the Many Worlds Interpretation of Quantum § Alienness Mechanics

  40. Epigrams on Programming

  41. ‘Story Of Your Life’ Is Not A Time-Travel Story

  42. On the Existence of Powerful Natural Languages

  43. Cat Psychology & Domestication: Are We Good Owners? § Fuzz Testing

  44. The Surprising Creativity of Digital Evolution: A Collection of Anecdotes from the Evolutionary Computation and Artificial Life Research Communities

  45. tank#alternative-examples

    [Transclude the forward-link's context]

  46. Security Mindset and Ordinary Paranoia

  47. Security Mindset and the Logistic Success Curve

  48. Desystemize #7

  49. Stargate Physics 101

  50. https://textslashplain.com/2017/01/14/the-line-of-death/

  51. Schneier on Security: Tagged Movie-Plot Threat Contests

  52. Security Is Mathematics

  53. https://kwarc.info/teaching/TDM/Borges.pdf

  54. No General Method to Detect Fraud

  55. https://www.amazon.com/Red-Teaming-Competition-Challenging-Everything/dp/1101905972

  56. No Really, There Are No Rules!

  57. Getting Over It Developer Reacts to 1 Minute 24 Second Speedrun

  58. https://www.reddit.com/r/slatestarcodex/comments/c0nqg7/people_seem_to_think_thieves_should_lockpick_or/er6huvz/

  59. https://www.reddit.com/r/DepthHub/comments/c0uutk/ugwern_talks_about_the_hacker_mindset_in/

  60. https://www.reddit.com/r/slatestarcodex/comments/1g1lmmn/gwern_hacker_mindset_nontechnical_examples/

  61. https://x.com/sonyaellenmann/status/1139752544761081858

  62. Wikipedia Bibliography:

    1. Speedrunning

    2. Social engineering (security)

    3. Milton Levine  :

    4. Formicarium  :

    5. Bruce Schneier

    6. Two-body problem in general relativity § Anomalous precession of Mercury  :

    7. Space Shuttle Challenger disaster  :

    8. Ralph Waldo Emerson  :

    9. Democritus

    10. On Generation and Corruption

    11. Speed running  :

    12. Tool-assisted speedrun  :

    13. Ender's Game

    14. Eurisko

    15. Stealth games  :

    16. Drywall  :

    17. Andy Schatz  :

    18. Monaco: What's Yours Is Mine  :

    19. Bill Mason (jewel thief)  :

    20. Die Hard  :

    21. Mouse-holing  :

    22. Battle of Nablus  :

    23. Locked-room mystery

    24. Dropped ceiling  :

    25. Raised floor  :

    26. Umineko When They Cry

    27. Lock bumping  :

    28. Hydraulic ram  :

    29. Matt Blaze  :

    30. Master keying  :

    31. Magic (illusion)

    32. Object permanence

    33. Misdirection (magic)

    34. Change blindness  :

    35. Naïve physics  :

    36. Teller (magician)  :

    37. Penn & Teller  :

    38. David Letterman

    39. Jim Steinmeyer  :

    40. Steganographic  :

    41. Gödel, Escher, Bach

    42. Jargon File

    43. Theories of humor § Incongruous juxtaposition theory  :

    44. Werner Heisenberg

    45. Through the Looking-Glass  :

    46. Max Stirner § Philosophy  :

    47. Fuzzing

    48. Satisfiability modulo theories  :

    49. Bias–variance tradeoff

    50. Defamiliarization

    51. Semantic satiation

    52. Baba Is You

    53. The City & the City  :

    54. IDN homograph attack