Topic: security model

17 chunks · 15 episodes

Topic summary

?
A short read on the topic's time range, peak episode, and strongest associations. Use it as the quick orientation before drilling into examples.
  • security model appears in 17 chunks across 15 episodes, from 2024-01-08 to 2026-02-09.
  • Its densest episode is Bits and Bobs 4/1/24 (2024-04-01), with 2 observations on this topic.
  • Semantically it travels with origin model, Apple, and combinatorial explosion, while by chunk count it sits between revealed preference and Microsoft; its yearly rank moved from #24 in 2024 to #98 in 2026.

Over time

?
Raw mentions over time. Use this to see absolute attention, not relative rank among all topics.
Mean 1.1 mentions per episode across the full range2024-01-08: 1 mention2024-01-29: 1 mention2024-02-12: 1 mention2024-03-18: 1 mention2024-04-01: 2 mentions2024-04-08: 2 mentions2024-04-15: 1 mention2024-04-22: 1 mention2024-05-13: 1 mention2024-09-09: 1 mention2024-09-30: 1 mention2024-11-25: 1 mention2026-01-12: 1 mention2026-01-19: 1 mention2026-02-09: 1 mention2024-01-08: 12024-01-29: 12024-02-12: 12024-03-18: 12024-04-01: 22024-04-08: 22024-04-15: 12024-04-22: 12024-05-13: 12024-09-09: 12024-09-30: 12024-11-25: 12026-01-12: 12026-01-19: 12026-02-09: 12024-01-082024-04-222026-02-09

Observations

?
The primary evidence view for this topic. Sort it chronologically when you want concrete examples behind the larger pattern.

Imagine an inherently dangerous domain.

from Bits and Bobs 1/12/26 ·

.... Like, say, working with fissile materials, or money transmission, or software security models. There is significant downside if you get it wrong. That means you need to be trained, and it might even need to be regulated. But imagine someone c...

Greasemonkey was wonderful back in the day.

from Bits and Bobs 9/30/24 ·

...t was self-catalyzing. But Greasemonkey ultimately had a low ceiling due to its security model. The laws of physics of a system, its security model, sets both the speed of distribution and also the ceiling of max penetration. Imagine a Greasemo...

What's the superpower of the web?

from Bits and Bobs 2/12/24 ·

...stant, carting along your cookie jar of state. One of the key invariants in the security model is "tapping a link should never be dangerous" This means that instead of each site being an island that has to be viable on its own, experiences are ...