Find a person’s profile across 350 social media sites
I personally like running my username through tools like this and aggregating my digital presence. When I was younger, I signed up for lots of sites that were the cool, new thing. Checking myself years later, I am shocked by the wide berth I left. Fitness accounts. Read more
BTC Endgame : Hacker News
Note that China already controls ~65% of Bitcoin hash rate, so if they wanted to execute this right now, they probably could. Read more
Never Split The Difference | Chris Voss | TEDxUniversityofNevada – YouTube
The struggle for survival in the Sahara Desert ‘Fennec fox and snake
Repeated fast attacks by the fox.
DALL·E: Creating Images from Text
DALL·E[1] is a 12-billion parameter version of GPT-3 trained to generate images from text descriptions, using a dataset of text–image pairs. Read more
The US Military is EVERYWHERE
I attempted to map every US Military base, and it was not easy. Check out Storyblocks Where I got loads of footage for this video: https://ift.tt/3gjFVRY If you live near a US military base, I want to hear from you! https://ift.tt/3smr91G I launched a Patreon. If y Read more
Singapore Budget: 20 years’ worth of fiscal surpluses drawn from reserves for COVID-19 crisis
A strategic plan to build back stronger in a “narrow window of opportunity” during COVID-19 – Singapore Deputy Prime Minister and Finance Minister Heng Swee Keat said this of the Budget during his closing speech in Parliament on Feb 26. About 20 years of fiscal surpluses have already been drawn from Read more
Investing is a Social Phenomenon
I first started trading on the stock market back in 2016. I had been curious about stock trading before that, but up until that point, I did what most people my age did, which is to simply put money into a regular savings account without really thinking about it. Read more
People, processes, priorities
People, processes, priorities. Twitter thread from Adrienne Porter Felt outlining her model for thinking about engineering management. I like this trifecta of “people, processes, priorities” a lot. Read more
Traitor
Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities (including most of GTFOBins) in order to pop a root shell. Read more