Skip to main content
Tour
About Us
Meta
current community
Stack Exchange
chat
Meta Stack Exchange
your communities
Sign up
or
log in
to customize your list.
more stack exchange communities
company blog
Log in
Stack Exchange
All Sites
Top 400 Users
Digests
D.W.
top
accounts
reputation
activity
subscriptions
Top Questions
220
votes
Please upload DMCA takedowns to the Chilling Effects Clearinghouse / Lumen Database
feature-request
status-completed
policy
legal
copyright-infringement
asked Apr 20, 2013 at 8:05
meta.stackexchange.com
189
votes
Why do we count starting from zero?
arrays
asked Sep 3, 2018 at 0:54
cseducators.stackexchange.com
162
votes
Should we trust the NIST-recommended ECC parameters?
elliptic-curves
nist
backdoors
nsa
asked Sep 9, 2013 at 3:07
crypto.stackexchange.com
129
votes
How to fool the "try some test cases" heuristic: Algorithms that appear correct, but are actually incorrect
algorithms
algorithm-analysis
education
correctness-proof
didactics
asked Aug 28, 2014 at 20:51
cs.stackexchange.com
81
votes
Express boolean logic operations in zero-one integer linear programming (ILP)
linear-programming
integer-programming
asked May 18, 2013 at 6:56
cs.stackexchange.com
74
votes
Why is water clear?
optics
visible-light
everyday-life
water
asked Mar 30, 2014 at 0:00
physics.stackexchange.com
66
votes
Can web sites detect whether you are using private browsing mode?
web-browser
privacy
asked Nov 19, 2011 at 3:08
security.stackexchange.com
61
votes
Apply word embeddings to entire document, to get a feature vector
classification
natural-language
supervised-learning
word2vec
word-embeddings
asked Jul 1, 2016 at 17:16
stats.stackexchange.com
61
votes
How to test whether a Linux binary was compiled as position independent code?
linux
security
fedora
executable
asked Sep 3, 2013 at 5:50
unix.stackexchange.com
59
votes
Is HTTP compression safe?
cryptography
ssl
asked Sep 20, 2012 at 0:07
security.stackexchange.com
1
2
3
4
5
…
10
next
Top Answers
173
Statement from SO: June 5, 2023 Moderator Action
meta.stackexchange.com
165
Why would someone trust DuckDuckGo or other providers with a similar privacy policy?
security.stackexchange.com
116
Should we sign-then-encrypt, or encrypt-then-sign?
crypto.stackexchange.com
114
Is it generally a bad idea to encrypt database fields?
security.stackexchange.com
114
How do computers keep track of time?
cs.stackexchange.com
112
Why is addition as fast as bit-wise operations in modern processors?
cs.stackexchange.com
101
What is a safe programming language?
cs.stackexchange.com
100
Express boolean logic operations in zero-one integer linear programming (ILP)
cs.stackexchange.com
94
Can anyone provide references for implementing web application self password reset mechanisms properly?
security.stackexchange.com
93
Are URLs viewed during HTTPS transactions to one or more websites from a single IP distinguishable?
security.stackexchange.com
89
Why can humans solve certain "undecidable" problems?
cs.stackexchange.com
86
What deliverables would you like to see out of a working group?
meta.stackexchange.com
84
How to achieve non-repudiation?
security.stackexchange.com
79
Should I use AntiForgeryToken in all forms, even login and registration?
security.stackexchange.com
78
Is von Neumann's randomness in sin quote no longer applicable?
cs.stackexchange.com
78
Can wiped SSD data be recovered?
security.stackexchange.com
78
Is Django's built-in security enough?
security.stackexchange.com
77
Lessons learned and misconceptions regarding encryption and cryptology
security.stackexchange.com
77
Firefox accusing me of distributing malware on my site
webmasters.stackexchange.com
76
Community and Moderator guidelines for escalating issues via new response process (March-April 2020)
meta.stackexchange.com
76
Is HTTP compression safe?
security.stackexchange.com
71
Why is deep learning hyped despite bad VC dimension?
cs.stackexchange.com
68
Effectiveness of Security Images
security.stackexchange.com
66
Recommended # of rounds for bcrypt
security.stackexchange.com
65
What to do if reviewers reject a paper without understanding the content?
academia.stackexchange.com
65
Attacker circumventing 2FA. How to defend?
security.stackexchange.com
61
"Argument list too long": How do I deal with it, without changing my command?
unix.stackexchange.com
61
Why does nobody use (or break) the Camellia Cipher?
crypto.stackexchange.com
61
I think I accidentally DoS'd a website. What should I do?
security.stackexchange.com
56
Why do we ask for a user's existing password when changing their password?
security.stackexchange.com
1
2
3
4
5
…
10
next