Reading Guide & Coverage Overview

Acropalypse Now Computerphile Information Center

Get comprehensive updates, key reports, and detailed insights compiled from verified editorial sources.

Table of Contents

Background on Acropalypse Now Computerphile

Researchers stumbled upon a simple but worrying bug. Cropped images from Pixel phones contained a great deal of the original ... Language Models' Achilles heel: Rob Miles talks about "glitch" tokens, those mysterious words which, which result in gibberish ... We've all got to the edge of the wifi coverage, but the idea of coverage produces a network problem, the Hidden Node Problem. How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ... Share part of a secret without knowing which part? Dr Tim Muller explains how Oblivious Transfer works. Professor Brailsford helped Adobe with PDF. His group helped move publishing forwards by publishing a journal about publishing ...

The tongue-in-cheek title refers to the fact that eBPF can be a shortcut to programming inside the kernel. Dr Richard G Clegg of ... Just what are elliptic curves and why use a graph shape in cryptography? Dr Mike Pound explains. Mike's myriad Diffie-Hellman ... Just what is happening inside a Convolutional Neural Network? Dr Mike Pound shows us the images in between the input and the ... The psychic paper in the TV show "Doctor Who" displays whatever the Doctor needs it to show at any given time. The Java ... How do we measure harm to improve the performance of Ai in the real world? Dr Hana Chockler is a Reader in Computer Science ... The 'secure' TETRA communications system has been used by police and security services for decades, it's been revealed that ...

Core Information

Explore the key sources for Acropalypse Now Computerphile.

Mike explains a paper from the University of Maryland, proposing a neat trick to 'watermark' the output of large language models ... Outlining the basics of compression methods, including some of the pitfalls! Dr Steve Bagley demonstrates. At the heart of Bzip2 is the Burrows Wheeler Transform. Dr Steve Bagley (and a live studio audience) explains how & why it works. Connecting via SSH to a remote machine is second nature to some, but how does it work? Dr Steve Bagley. Dr Mike Pound on ... Artificial Intelligence where neural nets play against each other and improve enough to generate something new. Rob Miles ...

Developments

Stay updated on Acropalypse Now Computerphile's newest achievements.

Featured Video Reports & Highlights

Below is a handpicked selection of video coverage, expert reports, and highlights regarding Acropalypse Now Computerphile from verified contributors.

Acropalypse Now - Computerphile
VIDEO

Acropalypse Now - Computerphile

190,579 views Live Report

Researchers stumbled upon a simple but worrying bug. Cropped images from Pixel phones contained a great deal of the original ...

Glitch Tokens - Computerphile
VIDEO

Glitch Tokens - Computerphile

346,356 views Live Report

Language Models' Achilles heel: Rob Miles talks about "glitch" tokens, those mysterious words which, which result in gibberish ...

WiFi's Hidden ____ Problem - Computerphile
VIDEO

WiFi's Hidden ____ Problem - Computerphile

604,537 views Live Report

We've all got to the edge of the wifi coverage, but the idea of coverage produces a network problem, the Hidden Node Problem.

Secret Key Exchange (Diffie-Hellman) - Computerphile
VIDEO

Secret Key Exchange (Diffie-Hellman) - Computerphile

1,093,865 views Live Report

How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ...

Deep Dive

Data is compiled from public records and verified media reports.

Last Updated: May 21, 2026

Summary

For 2026, Acropalypse Now Computerphile remains one of the most talked-about profiles. Check back for the newest reports.

Disclaimer: