# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 152
# self = https://watcher.sour.is?uri=https://feeds.twtxt.net/computerphile/twtxt.txt&offset=52
Defining Cybersecurity with Eugene Spafford - ComputerphileRead more
True Random Numbers - ComputerphileRead more
Binary Search Algorithm - ComputerphileRead more
Oblivious Transfer - ComputerphileRead more
Budget Self-Driving Car - ComputerphileRead more
How Bzip2 Works (Burrows Wheeler Transform) - ComputerphileRead more
CMPRSN (Compression Overview) - ComputerphileRead more
TETRA Vulnerability (TETRA:BURST) - ComputerphileRead more
Kernelless Kernel Programming (eBPF) - ComputerphileRead more
Turing Machine Alternative (Counter Machines) - ComputerphileRead more
Graphs, Vectors and Machine Learning - ComputerphileRead more
Defining Harm for Ai Systems - ComputerphileRead more
Mike's Cube Code - ComputerphileRead more
Quantum Computing in Reality (Pt3: Beyond the Hype) - ComputerphileRead more
Power LED Attack - ComputerphileRead more
Quantum: Current State 2023 - ComputerphileRead more
Four Principles of Quantum - ComputerphileRead more
Ethernet (50th Birthday) - ComputerphileRead more
Non-Deterministic Automata - ComputerphileRead more
Discussing PDF@30 Years Old - ComputerphileRead more
LogJam Attack - ComputerphileRead more
Foundations of Data Visualisation - ComputerphileRead more
Acropalypse Now - ComputerphileRead more
Bing Chat Behaving Badly - ComputerphileRead more
Automata & Python - ComputerphileRead more
Glitch Tokens - ComputerphileRead more
SenseMaking (Data Visualisation) - ComputerphileRead more
Sensemaking (Data Visualisation) - ComputerphileRead more
Rust and RAII Memory Management - ComputerphileRead more
Ch(e)at GPT? - ComputerphileRead more
Legacy Code Conversion - ComputerphileRead more
ChatGPT with Rob Miles - ComputerphileRead more
Garbage Collection (Mark & Sweep) - ComputerphileRead more
Emulation - ComputerphileRead more
Malware and Machine Learning - ComputerphileRead more
What do Computer Scientists Read? - ComputerphileRead more
MDE under the Hood (Model Driven Engineering) - ComputerphileRead more
Horrible, Helpful, http3 Hack - ComputerphileRead more
Verifying AI 'Black Boxes' - ComputerphileRead more
Just In Time (JIT) Compilers - ComputerphileRead more
Legged Robots - ComputerphileRead more
Encryption & Entropy - ComputerphileRead more
Network Time Protocol (NTP) - ComputerphileRead more
Robot Decision Making - ComputerphileRead more
Stable Diffusion in Code (AI Image Generation) - ComputerphileRead more
Uses of Information Theory - ComputerphileRead more
How AI Image Generators Work (Stable Diffusion / Dall-E) - ComputerphileRead more
Model Driven Software Engineering - ComputerphileRead more
Blockchain Benefits - ComputerphileRead more
Knowledge Graphs - ComputerphileRead more
SLAM Robot Mapping - ComputerphileRead more
Coffee with Brian Kernighan - ComputerphileRead more
Automated Mathematical Proofs - ComputerphileRead more
Scratch? Python? C? Kernighan on Languages for Kids Coding - ComputerphileRead more
Tricking AI Image Recognition - ComputerphileRead more
Computing with Soft Robots - ComputerphileRead more
LaMDA Logic - ComputerphileRead more
Reverse Engineering - ComputerphileRead more
No, it's not Sentient - ComputerphileRead more
What's Virtual Memory? - ComputerphileRead more
Why Information Theory is Important - ComputerphileRead more
Breaking RSA - ComputerphileRead more
How WiFi Works - ComputerphileRead more
Psychic Paper (Java Vulnerability) - ComputerphileRead more
Square & Multiply Algorithm - ComputerphileRead more
Automating Boston Dynamics Spot Robot - ComputerphileRead more
High Level Languages & the IBM 360 Series - ComputerphileRead more
Teamwork & Git - ComputerphileRead more
Apple M1 Ultra & NUMA - ComputerphileRead more
Mythical Man Month - ComputerphileRead more
Internet Congestion Collapse - ComputerphileRead more
Git Version Control _final_new_final.new - ComputerphileRead more_
Inside the Hidden Git Folder - ComputerphileRead more
The Metaverse, Why Now? - ComputerphileRead more
K-d Trees - ComputerphileRead more
Man in the Middle & Needham–Schroeder Protocol - ComputerphileRead more
Git Overview - ComputerphileRead more
Log4J & JNDI Exploit: Why So Bad? - ComputerphileRead more
Joining Point Cloud Scans (ICP) - ComputerphileRead more
Sinclair Software & Manuals - ComputerphileRead more
Discussing System On Chip (SoC) - ComputerphileRead more
Depth Camera - ComputerphileRead more
What is Quantum Superposition? - ComputerphileRead more
WiFi's Hidden ____ Problem - ComputerphileRead more____
Saving the Universe (Simulation) - ComputerphileRead more
Facebook's Day Off! - ComputerphileRead more
Sir Clive Sinclair & British Computer Revolution - ComputerphileRead more
Bit Blit Algorithm (Amiga Blitter Chip) - ComputerphileRead more
Random Numbers with LFSR (Linear Feedback Shift Register) - ComputerphileRead more
Programming with Proofs - ComputerphileRead more
Hacking Out of a Network - ComputerphileRead more
Eliminating Run-Time Errors with Agda - ComputerphileRead more
Dealing With Big Data - ComputerphileRead more
(Not) Discussing the Web @ 30 Years Old - ComputerphileRead more
The Hardest Problem in Type Theory - ComputerphileRead more
TPM (Trusted Platform Module) - ComputerphileRead more
Javascript Card Trick - ComputerphileRead more
Post Office Horizon Scandal - ComputerphileRead more
Who's Telling the Truth? Using "Gobble" - ComputerphileRead more
Driverless Cars - ComputerphileRead more