From BLOG@CACM
A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently…
Alex Vakulov| August 10, 2022
Not everyone who questions computational hegemony is appealing to magic, mysticism, or divinity.
Robin K. Hill From BLOG@CACM | September 27, 2021 at 09:15 PM
Can we establish a locution for the results of a program that does not ascribe decision-making power?
Robin K. Hill From BLOG@CACM | May 21, 2018 at 11:12 AM