A plugin to force Twitter to respect your settings and stop showing you "top" tweets

Twitter has a setting that (nominally) allows you to turn off its default of showing you "top" tweets (as selected by its engagement-maximizing, conflict-seeking algorithm), but periodically, Twitter just ignores that setting and starts nonconsensually eyeball-fucking you with inflammatory headlines. Read the rest

SQL Murder Mystery: teaching SQL concepts with a mystery game

SQL Murder Mystery is a free/open game from Northwestern University's Knight Lab that teaches the player SQL database query structures and related concepts while they solve imaginary crimes. Read the rest

A list of companies that contract with ICE

Last week, free software developer Seth Vargo pulled the plug on tools he made to work with software developed by his former employer Chef, in protest of Chef's ongoing contracts with US Immigration and Customs Enforcement, a federal agency that has been implicated in crimes against humanity, including ethnic cleansing, family separation, and the deaths of children in its custody. Read the rest

Google releases a free/open differential privacy library

"Differential privacy" (previously) is a promising, complicated statistical method for analyzing data while preventing reidentification attacks that de-anonymize people in aggregated data-sets. Read the rest

CHESSES: chess variants for nonexperts, nonplayers, and the very playful

Pippin Barr (previously) writes, "I have a history of making variations on existing games (see also: PONGS, BREAKSOUT, SNAKISMS), and Chesses (source, CC BY-NC) is a continuation of that. I find chess a really interesting game to play around with because it's so classic and sort of monolithic - it's fun to mess with tradition. Other than kind of formal enjoyment involved, I suspect the variations might level the playing field a bit and allow non-experts (or even non-players?) to play some chess." Read the rest

Pacman in 512 bytes

Pillman is Oscar "Nanochess" Toledo's reimplementation of Pacman ("a game about a yellow man eating pills") in 512 bytes -- small enough to fit in a boot sector -- written in 8088 assembler. (via Four Short Links) Read the rest

Rogess: chess with roguelike combat

Roguelike games (previously) are "a subgenre of role-playing video game characterized by a dungeon crawl through procedurally generated levels, turn-based gameplay, tile-based graphics, and permanent death of the player character" (Wikipedia). Read the rest

Read the source code for every classic Infocom text-adventure game!

Jason Scott has made the source available for every one of Infocom's classic and genre-defining text adventure games (previously) for the Apple ][+ and its successors, posting it to Github under the historicalsource account. Read the rest

A rapidly proliferating software license bars use by companies with poor labor practices

Katt Gu and Suji Yan's Anti 996 License allows developers to prohibit the use of their code by companies that do not adhere to basic labor practices (996 is a Chinese software industry term for shops where coders work 9AM-9PM, 6 days/week). Read the rest

Rise of the Surveillance Scooters?

Imagine being falsely accused of a crime, and even though you know you did nothing wrong, you’re forced to wear a tracking device that monitors every time you leave the house: where you go, when, and for how long. Even though you’re completely innocent, suddenly every errand and day trip is recorded, indefinitely, to be scrutinized, analyzed, and maybe even used against you.  Go to the doctor? They know. Go to AA? They know. Go anyplace where you prize your anonymity, and the government will still know. Read the rest

Freedom EV: free/open replacement firmware for your electric vehicle -- including a Tesla

Freedom EV is a free/open software stack intended to replace the software in your electric vehicle, it's been tested on a Tesla Model X and should work on a Model S, if you can get root. Read the rest

Hide and seek: A catalog of useful steganography tools

Steganography is the art of hiding things in plain sight: for example, secretly encoding a message in an image by flipping the least-significant bit in each pixel to create a binary string that can be decoded as text. Read the rest

Mozilla pulls a popular paywall circumvention tool from Firefox add-ons store

Bypass Paywalls is a popular extension for Firefox and Chrome that does what the name implies: allows your browser to manipulate its cookies so that websites with "soft paywalls" that allow a small number of free articles can't accurately determine if you've already exceeded your limit. Read the rest

Malware vector: become an admin on dormant, widely-used open source projects

Many open source projects attain a level of "maturity" where no one really needs any new features and there aren't a lot of new bugs being found, and the contributors to these projects dwindle, often to a single maintainer who is generally grateful for developers who take an interest in these older projects and offer to share the choresome, intermittent work of keeping the projects alive. Read the rest

A science-fiction-inspired desktop UI for your Lin/Win/Mac system

Squared (AKA Gaby) is a French hacker who created edex-ui, a science-fiction inspired desktop "heavily inspired from DEX-UI and the TRON Legacy movie effects," which gives you a terminal and live telemetry from your system; it looks like it would be especially fun on a tablet (though if you really wanna go sci fi, build a homebrew cyberspace deck). Read the rest

For $20, you can make a DIY Stingray in minutes, using parts from Amazon

Stingrays were once the most secretive of surveillance technology: devices whose existence was so sensitive that the feds actually raided local cops and stole their crime files to stop them from being introduced in court and revealing the capability to spy on cellular phones. Read the rest

Evolutionary Space Invaders: shoot the aliens as a genetic algorithm modifies them

InvaderZ is a Space Invaders variant that incorporates a genetic algorithm that mutates the invaders as you shoot at them, with survival for a fitness function: the longer an invader lasts before being blasted out of the sky, the more its behaviors are carried over into the next wave (here's a playable live version). (via Kottke) Read the rest

More posts