Matches for " m", 2254 total results Sorted by newest | relevance
Sat Nov 28 18:04:42 UTC 2015 <mircea_popescu> !s m s.nsa
Sat Nov 28 17:25:15 UTC 2015 <mircea_popescu> n bytes are allocated to "ring buffer", from offset k to offset k+n. the convention of reading this is that structures started at k+n-m that are m+p bytes long continue from k+n to k and all the way to k+p
Sat Nov 28 17:04:44 UTC 2015 <mircea_popescu> M and m work together!
Sat Nov 28 17:04:19 UTC 2015 <mircea_popescu> M-m tandem.
Sat Nov 28 17:04:02 UTC 2015 <mircea_popescu> A M-m tandem works to attack A.
Sat Nov 28 17:03:53 UTC 2015 <mircea_popescu> if A does not, M will not.
Sat Nov 28 17:03:49 UTC 2015 <mircea_popescu> node m connects to A, sends garbage. if A manages to decrypt it, M will see it.
Sat Nov 28 17:03:30 UTC 2015 <mircea_popescu> I operate node M.
Wed Nov 25 23:41:35 UTC 2015 <jurov> !t m s.dope
Wed Nov 25 23:34:56 UTC 2015 <thestringpuller> !t m s.mpoe
Wed Nov 25 22:41:17 UTC 2015 <pete_dushenski> "Coley is quoted in police documents as saying “You bumbaclot Muslim,” a phrase containing a Jamaican expletive. “I’m going to burn your Muslim temple down,” he added, before spitting on the woman several times."
Wed Nov 25 02:48:53 UTC 2015 <adlai> !t m s.mpoe
Fri Nov 20 16:31:15 UTC 2015 <assbot> Message to My Freshman Students | Keith M. Parsons ... ( http://bit.ly/1QSXW7X )
Fri Nov 20 16:31:14 UTC 2015 <mircea_popescu> http://www.huffingtonpost.com/keith-m-parsons/message-to-my-freshman-st_b_7275016.html << i find the admixture of wishful thinking and budding classism actually quite endearing. like a 15yo's first sexual blush.
Fri Nov 20 16:23:48 UTC 2015 <pete_dushenski> with 'm' for sure
Fri Nov 20 16:18:56 UTC 2015 <pete_dushenski> BingoBoingo: perhaps, but still, never the twain shall meet. they're different sorts of kidz. yale kidz might want to party hard, but they'll do m/blow/raves, not couch burning and fist-fighting.
Fri Nov 20 12:24:54 UTC 2015 <jurov> !t m x.eur
Thu Nov 19 16:09:49 UTC 2015 <mircea_popescu> "This cost-benefit analysis doesn't end at successful exploitation. According to Snowden, the TAO?that?s Tailored Access Operations?operators running the FOXACID system have a detailed flowchart, with tons of rules about when to stop. If something doesn't work, stop. If they detect a PSP, a personal security product, stop. If anything goes weird, stop. This is how the NSA avoids detection, and also how it takes m
Wed Nov 18 19:22:32 UTC 2015 <ascii_field> i looked into a few in m
Tue Nov 17 01:59:29 UTC 2015 <adlai> !t m s.mpoe