Find a person’s profile across 350 social media sites

I personally like running my username through tools like this and aggregating my digital presence. When I was younger, I signed up for lots of sites that were the cool, new thing. Checking myself years later, I am shocked by the wide berth I left. Fitness accounts. Read more

BTC Endgame : Hacker News

Note that China already controls ~65% of Bitcoin hash rate, so if they wanted to execute this right now, they probably could. Read more

DALL·E: Creating Images from Text

DALL·E[1] is a 12-billion parameter version of GPT-3 trained to generate images from text descriptions, using a dataset of text–image pairs. Read more

The US Military is EVERYWHERE

I attempted to map every US Military base, and it was not easy. Check out Storyblocks Where I got loads of footage for this video: https://ift.tt/3gjFVRY If you live near a US military base, I want to hear from you! https://ift.tt/3smr91G I launched a Patreon. If y Read more

Investing is a Social Phenomenon

I first started trading on the stock market back in 2016. I had been curious about stock trading before that, but up until that point, I did what most people my age did, which is to simply put money into a regular savings account without really thinking about it. Read more

People, processes, priorities

People, processes, priorities. Twitter thread from Adrienne Porter Felt outlining her model for thinking about engineering management. I like this trifecta of “people, processes, priorities” a lot. Read more

Traitor

Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities (including most of GTFOBins) in order to pop a root shell. Read more