Weird Machines, Exploitability, and Provable Unexploitability
[Transclude the forward-link's
context]
Surprisingly Turing-Complete
2012-sistery-tryingtoseethrough.html
Falsehoods Programmers Believe About X
The Law of Leaky Abstractions
Technology Forecasting: The Garden of Forking Paths
The Security Mindset
https://www.tbray.org/ongoing/When/202x/2022/06/02/Dangerous-Gift
https://x.com/_JeanLannes/status/1687649736356982784
Appendix F: Personal Observations on the Reliability of the Shuttle
The Complete Works of Ralph Waldo Emerson: Natural History of Intellect, and Other Papers [Vol. 12]
An Atomist Illustration In Aristotle
Thread by @Gankro: "Zelda Speedrunners Are Now at the Point Where They'Re Attacking the Memory Allocator to Go Fast—Repeatedly Leaking Memory to Get the Heap […]"
Overload Glitch (Halo 3)
How Mario 64 Was Solved Using Parallel Universes—Super Mario 64 Tool-Assisted Speedrun Explained
A Burglar’s Guide to the City
Confessions of a Master Jewel Thief
Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker
Nakatomi Space
Seven Types of Locked Room Mystery (Part 1/5)
Umineko: The Hopium Of The Magics
Willard's Truths
The Search for the Perfect Door
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks
Safecracking for the Computer Scientist
Toward a Broader View of Security Protocols
https://x.com/mattblaze/status/1553254965870841856
Attention and awareness in stage magic: turning tricks into research
Teller Reveals His Secrets: The smaller, quieter half of the magician duo Penn & Teller writes about how magicians manipulate the human mind
Teller (Of Penn & Teller) on Revealing Magic Tricks
Notes on a Strange World: Houdini’s Impossible Demonstration
Littlewood’s Law and the Global Media
Tripping on nothing: placebo psychedelics and contextual factors
Playing to Win
Hacker Humor
Playing to Win Overview
Formal Theory of Creativity & Fun & Intrinsic Motivation (1990–2010)
The Dematerialization of Matter
Heisenberg’s Uncertainty Principle and the Many Worlds Interpretation of Quantum § Alienness Mechanics
Epigrams on Programming
‘Story Of Your Life’ Is Not A Time-Travel Story
On the Existence of Powerful Natural Languages
Cat Psychology & Domestication: Are We Good Owners? § Fuzz Testing
The Surprising Creativity of Digital Evolution: A Collection of Anecdotes from the Evolutionary Computation and Artificial Life Research Communities
tank#alternative-examples
[Transclude the forward-link's
context]
Security Mindset and Ordinary Paranoia
Security Mindset and the Logistic Success Curve
Desystemize #7
Stargate Physics 101
https://textslashplain.com/2017/01/14/the-line-of-death/
Schneier on Security: Tagged Movie-Plot Threat Contests
Security Is Mathematics
https://kwarc.info/teaching/TDM/Borges.pdf
No General Method to Detect Fraud
https://www.amazon.com/Red-Teaming-Competition-Challenging-Everything/dp/1101905972
No Really, There Are No Rules!
Getting Over It Developer Reacts to 1 Minute 24 Second Speedrun
https://www.reddit.com/r/slatestarcodex/comments/c0nqg7/people_seem_to_think_thieves_should_lockpick_or/er6huvz/
https://www.reddit.com/r/DepthHub/comments/c0uutk/ugwern_talks_about_the_hacker_mindset_in/
https://www.reddit.com/r/slatestarcodex/comments/1g1lmmn/gwern_hacker_mindset_nontechnical_examples/
https://x.com/sonyaellenmann/status/1139752544761081858