essays.html 4.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586
  1. <html>
  2. <head>
  3. <meta name="viewport" content="width=device-width, initial-scale=1">
  4. <link rel = "stylesheet" type ="text/css" href="essays_cirrus.css">
  5. </head>
  6. <body>
  7. <br>
  8. <p>My topics include everything that is real. I'm unbounded by categorization of reality into various disciplines. Theory and practice meld into each other here.
  9. <br>
  10. <div type="foo">
  11. <div class="row">
  12. <div class="col">
  13. <div class="card slide-up">
  14. <div class="card-container">
  15. <div class="card-image" style="background-image: url('/sagar/static/snake2.jpg')"></div>
  16. </div>
  17. <div class="mobile-title">
  18. <div class="content">
  19. <div class="tile">
  20. <div class="tile__container">
  21. <p class="tile__title">Pretending Computer Security</p>
  22. <p class="tile__subtitle">6th Aug, 2021</p>
  23. </div>
  24. </div>
  25. </div>
  26. </div>
  27. <div class="card-body content">
  28. <p>A how-to for making a user believe that your software is secure, while overpowering him completely.</p>
  29. </div>
  30. <div class="action-bar u-center">
  31. <a href="/sagaracharya/blog/pretend_computer_security"><button class="btn">More</button></a>
  32. </div>
  33. </div>
  34. </div>
  35. <div class="col">
  36. <div class="card slide-up">
  37. <div class="card-container">
  38. <div class="card-image" style="background-image: url('/sagar/static/chanakya.jpg')"></div>
  39. </div>
  40. <div class="mobile-title">
  41. <div class="content">
  42. <div class="tile">
  43. <div class="tile__container">
  44. <p class="tile__title">Perfect Computer Security</p>
  45. <p class="tile__subtitle">11th March, 2021</p>
  46. </div>
  47. </div>
  48. </div>
  49. </div>
  50. <div class="card-body content">
  51. <p>How can we be absolutely sure that no one is listening to our transmitted messages (military level security).</p>
  52. </div>
  53. <div class="action-bar u-center">
  54. <a href="/sagaracharya/blog/trusting_no_one"><button class="btn">More</button></a>
  55. </div>
  56. </div>
  57. </div>
  58. <div class="col">
  59. <div class="card slide-up">
  60. <div class="card-container">
  61. <div class="card-image" style="background-image: url('/sagar/static/blog_1.jpg')"></div>
  62. </div>
  63. <div class="mobile-title">
  64. <div class="content">
  65. <div class="tile">
  66. <div class="tile__container">
  67. <p class="tile__title">Choosing freedom with FOSS stack</p>
  68. <p class="tile__subtitle">24th Oct, 2020</p>
  69. </div>
  70. </div>
  71. </div>
  72. </div>
  73. <div class="card-body content">
  74. <p>A set of tools to shift from surveillance technologies set up to "protect" you to owning yourself.</p>
  75. </div>
  76. <div class="action-bar u-center">
  77. <a href="/sagaracharya/blog/foss_stack"><button class="btn">More</button></a>
  78. </div>
  79. </div>
  80. </div>
  81. </div>
  82. </body>
  83. </html>