Profile

Cover photo
David Jordan
Worked at Novacut
569 followers|235,701 views
AboutPostsPhotosYouTube

Stream

David Jordan

Shared publicly  - 
 
+System76's AR Sandbox tutorial is now featured on +WIRED!
3
1
Add a comment...

David Jordan

Shared publicly  - 
 
Ubuntu users, if you're having trouble getting updates (and your computer is running hot because appstreamcli is eating all your CPU), there's a pretty easy solution: disable xenial-backports and run the updater.

Open Software & Updates, go to the Updates tab, and deselect "Unsupported updates (xenial-backports)".

Click the close button and refresh the software list when prompted.

Next, launch the Software Updater to install updates.

After the updates are finished installing, you can go back to Software & Updates and reselect "Unsupported updates (xenial-backports)".  Future updates should work after this.
3
Måns Rullgård's profile photo
 
Another Windows exclusive is exclusive no more.
Add a comment...

David Jordan

Shared publicly  - 
 
Huh, I just realized that if you count +Terry Hancock's Lunatic's series, I have a Kevin Bacon number of 3 via Paul Birchard.
1
Terry Hancock's profile photo
 
So we need to encourage Paul to do a movie with Kevin Bacon so we can move up to 2, then? ;-)
Add a comment...

David Jordan

Shared publicly  - 
 
This is why "innocent until proven guilty" is a thing.  When critical commentary is blocked just on the say-so of the copyright holder, their proxy, or even some random person, that's not right.  YouTube's system was made to appease big studios, but created widespread  fraud in its wake.
YouTube needs to address this problem, and artists like the nostalgia critic need an alternative to YouTube.
1
Add a comment...

David Jordan

Shared publicly  - 
 
How about two #ZHackers books?  Here's a peek at the cover of the second one! 
2
Add a comment...

David Jordan

Shared publicly  - 
 
Interesting +Jason DeRose, that might be a nice generalization.
 
A small critique of the Cryptographic Doom Principle.

This is a great post that is very much worth reading and carefully considering. But I think there's a more general principal that this post misses, or at least doesn't state as clearly as it could.

I don't think the core lesson here is the order (and variations thereof) in which encryption and authentication are performed.

Instead, I think the core lesson is that under no circumstance should a protocol take any action whatsoever on unauthenticated data, especially when that action has consequences observable to an outside attacker (active or passive). This was the fundamental flaw in both examples presented.

In the first example, a padding check was performed on unauthenticated data. Now I think this example raises some key wisdom as to why block cyphers are (implementation-wise) rather dangerous and that stream cyphers should generally be preferred. But again, the fundamental problem was acting on unauthenticated data.

In the second example, a bit of unauthenticated data was interpreted as the size of the next application-level data payload, the acting upon of which is clearly observable to an outside attacker. Again, the fundamental problem was acting on unauthenticated data. But I also think this second example raises a flaw that seems present in most current protocol designs: really, the size of the next variable-length message should be conveyed independently via a fixed-length message with its own MAC (I can't find an example of this in any existing protocols, but if you know of one, please let me know).
View original post
1
Add a comment...
Have him in circles
569 people
Ansul Kumar's profile photo
Christoffer Mattson's profile photo
Loknan Nanyak's profile photo
James Raymond's profile photo
Kizzie Gividen's profile photo
Broken Continent's profile photo
Mary Kay Dennehy's profile photo
Patricia Rapozo's profile photo
Virginia Negral's profile photo

David Jordan

Shared publicly  - 
 
This is a really awesome project I've been dying to share with everyone!  Thanks to my fellow +System76 ers.  +Jason DeRose packaged the software and wrote a great tutorial, and I helped make the video with +Cassidy James Blaede.

Seriously, just check it out!
 
Build this interactive topographic map at home with our easy step-by-step guide packaged just for Ubuntu. Shape real sand and become mesmerized by the life-like simulated water flow. Check out the project details at http://s76.co/Y2Fwda
2 comments on original post
7
Christine Edison's profile photo
 
I saw that on Facebook -- really cool, David! My geology professor friend sounded especially excited about it.
Add a comment...

David Jordan

Shared publicly  - 
 
Tracking down 'frame-eating' bug in the version of x264 included in wily.  So far, this seems to affect both straight ffmpeg-based programs (blender) and gstreamer pipelines using x264enc.  This only happens when encoding intraframes and not all-keyframes.
On close testing, affected files have the correct number of frames, but every frame's timestamp is offset by ~2 frames, so frame 0 has a non-zero timestamp that's (almost) exactly what frame 2 should have.
1
Add a comment...

David Jordan

Shared publicly  - 
 
I just got a proof-of-concept epub3 with webgl interactive cover working in Sigil...even better ebooks here we come!
2
Add a comment...

David Jordan

Shared publicly  - 
 
Hey, all!  I'm coming to Capricon again this year to share my ZHackers books and have a great time.  Really, Capricon last year was one of the most fun events I've attended, and if you're in the Chicagoland area and have the time and can afford a badge, I really recommend it!  And this year, I'm a panelist!  Here are the panels I'm on:

Reading: David Jordan - Thursday, 02-11-2016 - 7:30 pm to 8:00 pm - Birch A
Join David Jordan for a reading from his ZHackers books. Big ideas mix with humor, character, and heart in and exciting tale of clever geeks using their brains to survive the zombie apocalypse. Can science, engineering, and the power of a really good science fiction reference save the day?

Science Gone Bad - Friday, 02-12-2016 - 5:30 pm to 7:00 pm - Botanic Garden A (Main Stage)
Science is less Eureka!, and more "Well, that didn't work." Come hear about the times that science went horribly wrong. #FieldWorkFail

How Does That Planet Work? - Saturday, 02-13-2016 - 4:00 pm to 5:30 pm - Botanic Garden A (Main Stage)
Planets in SF & F do not always follow physics as we know it. How does that actually work?
Our easy-to-use, mobile-friendly program guide can be found at guide.capricon.org
1
Add a comment...

David Jordan

Shared publicly  - 
 
Ever want a detailed look at an author's reasons for breaking a book up into multiple parts?  Then read on to learn about the evolution of ZHackers: Volume 3 and the storytelling principles guiding the way.

Hint: It's more LOTR than The Hobbit!
Yes, ZHackers: Volume 3 is going to be not one, but four books! Four very nerdy, thoughtful books full of big ideas, science experiments, and engineering projects gallore!
1
Add a comment...

David Jordan

Shared publicly  - 
 
Have you been waiting for a new ZHackers book?
6
1
Anthony Zotti's profile photo
 
Oh, hell yes!
Add a comment...
People
Have him in circles
569 people
Ansul Kumar's profile photo
Christoffer Mattson's profile photo
Loknan Nanyak's profile photo
James Raymond's profile photo
Kizzie Gividen's profile photo
Broken Continent's profile photo
Mary Kay Dennehy's profile photo
Patricia Rapozo's profile photo
Virginia Negral's profile photo
Basic Information
Gender
Male
Work
Employment
  • Novacut
Links