| 1. | | Techniques To Simplify Sign-Ups and Log-Ins (smashingmagazine.com) |
| 416 points by cwan on May 5, 2011 | 175 comments |
|
| 2. | | DHS asks Mozilla to take down MafiaaFire add-on (lockshot.wordpress.com) |
| 368 points by akavlie on May 5, 2011 | 75 comments |
|
| 3. | | Mysterious US Helicopter Used in Bin Laden Raid (wired.com) |
| 282 points by Element_ on May 5, 2011 | 128 comments |
|
| 4. | | Hacking Hacker News Headlines (metamarketsgroup.com) |
| 275 points by th0ma5 on May 5, 2011 | 34 comments |
|
| 5. | | A $4.8M model airport with computer controlled vehicles (news.com.au) |
| 214 points by mmcconnell1618 on May 5, 2011 | 46 comments |
|
| 6. | | The story of George — ayttm's most prolific non-developing contributor (bluesmoon.info) |
| 212 points by bluesmoon on May 5, 2011 | 8 comments |
|
| 7. | | British hackers: stop voting for lizards; start voting for people today (reprog.wordpress.com) |
| 199 points by MikeTaylor on May 5, 2011 | 101 comments |
|
| 8. | | Sony was running unpatched Apache with no firewall for months before breach (consumerist.com) |
| 188 points by joshes on May 5, 2011 | 65 comments |
|
| 9. | | Silicon Milkroundabout: Forget the banks, come and join a London startup (siliconmilkroundabout.com) |
| 169 points by lucraft on May 5, 2011 | 147 comments |
|
| 10. | | Front End Development Guidelines (taitems.tumblr.com) |
| 154 points by taitems on May 5, 2011 | 49 comments |
|
| 11. | | Oracle Ordered to Reduce Claims Against Google From 132 to 3 (groklaw.net) |
| 142 points by gluegadget on May 5, 2011 | 38 comments |
|
| 12. | | 52 Years and $750 Million Prove Einstein Was Right (nytimes.com) |
| 134 points by jonburs on May 5, 2011 | 31 comments |
|
| 13. | | Leveling Up: Career Advancement for Software Developers (peterlyons.com) |
| 129 points by focusaurus on May 5, 2011 | 39 comments |
|
| 14. | | How to Beat High Airfares (nytimes.com) |
| 129 points by aaronbrethorst on May 5, 2011 | 133 comments |
|
| 15. | | New stable release of Go (golang.org) |
| 129 points by uriel on May 5, 2011 | 80 comments |
|
| 16. | | 8GB MicroSD Atari 810 disk drive, built to scale (rossum.posterous.com) |
| 127 points by a1k0n on May 5, 2011 | 9 comments |
|
| 17. | | What are some startup ideas that persistently fail? (quora.com) |
| 121 points by helwr on May 5, 2011 | 91 comments |
|
| 18. | | Why linux doesn't have a "wheel" group (administratosphere.wordpress.com) |
| 118 points by j_baker on May 5, 2011 | 62 comments |
|
| 19. | | LastPass requesting password reset after facing unknown anomaly (lastpass.com) |
| 111 points by sathyabhat on May 5, 2011 | 63 comments |
|
| 20. | | FBI chastened by court for lying about existence of surveillance records (eff.org) |
| 109 points by grellas on May 5, 2011 | 13 comments |
|
| 21. | | Thrift vs. Protocol Buffers (floatingsun.net) |
| 108 points by peterb on May 5, 2011 | 24 comments |
|
| 22. | | Amazon's Jeff Bezos Backs Nuclear Startup General Fusion (gigaom.com) |
| 103 points by hornokplease on May 5, 2011 | 47 comments |
|
| 23. | | The Myth of the Rule of Law (msb.edu) |
| 100 points by ataggart on May 5, 2011 | 35 comments |
|
| 24. | | Steve Wozniak Calls Paul Allen A Patent Troll (itproportal.com) |
| 90 points by chanks on May 5, 2011 | 18 comments |
|
| 25. | | The Wall Street Journal Launches a WikiLeaks Competitor, SafeHouse (theatlantic.com) |
| 89 points by ssclafani on May 5, 2011 | 78 comments |
|
| 26. | | Go at Heroku - build your own Chubby (theregister.co.uk) |
| 96 points by timclark on May 5, 2011 | 21 comments |
|
| 27. | | Facebook considering $3-4Bn buyout of Skype (mashable.com) |
| 84 points by pitdesi on May 5, 2011 | 62 comments |
|
| |
| 81 points | parent |
|
| |
|
|
| 30. | | How decompilers work (archfinch.com) |
| 82 points by drx on May 5, 2011 | 59 comments |
|
|
| More |
3. Request Confidentiality: If you would like us to consider treating your submission as confidential before providing any materials, please make this request through this online submission form. Please note that until we mutually decide to enter into a confidential relationship, any information you send to us (including contact information) can be used for any purpose, as outlined in point 1 above, and described more fully below in the Limitations section). If we enter into a confidential relationship, Dow Jones will take all available measures to protect your identity while remaining in compliance with all applicable laws.
Wikileaks version:
2.3 Protection for you
Wikileaks does not record any source-identifying information and there are a number of mechanisms in place to protect even the most sensitive submitted documents from being sourced. We do not keep any logs. We can not comply with requests for information on sources because we simply do not have the information to begin with. Similarly we can not see your real identity in any anonymised chat sessions with us. Our only knowledge of you as a source is if you provide a coded name to us. A lot of careful thought by world experts in security technologies has gone into the design of these systems to provide the maximum protection to you. Wikileaks has never revealed a source.