Razumov’s theory of Brothers KaramazovBrothers Karamazov is a novel by Dostoevsky. If you haven’t read it yet, please skip reading this post, because it has spoilers. I have…May 20, 2024May 20, 2024
Simple End-to-End EncryptionUntil WhatsApp had incorporated the Signal protocol, end-to-end encryption’s adoption was almost non-existent. Yet, WhatsApp left the…Sep 11, 2023Sep 11, 2023
Seasteading is DefenselessThe term seasteading is the analog of homesteading for the oceans: the idea that houses can be built in the open seas. The only “game in…Jan 14, 20221Jan 14, 20221
Composing a TuneOver the years I came up with several melodies and recorded them in audio on my iPhone. It was easy to stumble upon a melody while…Nov 30, 20211Nov 30, 20211
Published inCantor’s ParadiseTriangular NumbersToday I gave a math lesson to my five year old and stumbled upon a mathematical property that I didn’t know of: any square number is a sum…Aug 1, 20212Aug 1, 20212
Published inCantor’s ParadiseProblems with Ancient Musical ScalesOne-sentence summary: I explain why an exponential scale was invented, and how it compares with the older scales based on ratios of…Jul 8, 20217Jul 8, 20217
Published inExCommunicationsRejecting the Pascal’s WagerHere is the story of how I became an atheist and stopped fearing God. My transformation occurred through exposure to three philosophical…Jun 26, 20215Jun 26, 20215
Published inatheism101The Shortcomings of “Raised by Wolves”Raised by Wolves is a science fiction TV series directed by Ridley Scott, the same man who directed Blade Runner. The setting is a…May 15, 2021May 15, 2021
Published inInfoSec Write-upsTowards Shorter Encryption keysThis article goes into technical details concerning Elliptic Curve encryption.May 12, 20211May 12, 20211
Published inAWS in Plain EnglishAWS Site-to-Site VPN with NATAt Smarking, we use the Amazon Web Services (AWS) infrastructure. We help organizations improve the efficiency of parking lots, and to do…May 12, 20213May 12, 20213
Diffie-Hellman for the LaymanWhitfield Diffie and Martin Hellman are researchers who invented a safe method to communicate a password. Their 1976 paper opens with the…Apr 24, 202160Apr 24, 202160
Securing Third Party CookiesThis is a technical article about web development.Apr 2, 20212Apr 2, 20212
Verification of Self-Signed CertificatesWhen interfacing to third-party web services, one often has to deal with self-signed SSL certificates that trigger verification errors…Feb 4, 20214Feb 4, 20214
“Crime and Punishment” ReviewIt’s been a long time since I read, nay, swallowed the famous novel “Crime and Punishment” by Dostoyevsky (Достоевский). But yesterday, I…Oct 2, 2020Oct 2, 2020
The Outdoor Standing DeskIn the previous article The Tree Table Workstation I have written about how I came up with the Tree Table, and listed all the accessories…Aug 13, 2020121Aug 13, 2020121
The Tree Table WorkstationIn my previous article titled “The Outdoor Office” I described how I used Roll-a-Table to take my work outdoors. That table allows me to…Aug 2, 2020Aug 2, 2020
The Outdoor OfficeI got into computers during my teenage years which was back in mid-nineties. I spent a lot of time cooped up in my room for the simple…Apr 18, 2020521Apr 18, 2020521
Anonymizing Relationships in DatabasesThis is a technical article for software developers concerned with privacy of users. However, it’s written in a general way, so that a…Jan 18, 2020Jan 18, 2020