HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage
tenable.com·1d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Can we hide the orange dot without disabling SIP?
notes.alinpanaitiu.com·1d·
Discuss: Hacker News
Formal Methods
Flag this post
A PoC to make a backdoored PyTorch neural network
hacktelligence.org·17h·
Discuss: Hacker News
🦀Rust
Flag this post
How I Leverage LLMs
indiethinkers.com·44m·
Discuss: Hacker News
Formal Methods
Flag this post
Essential Things to Know Before Upgrading Your Computer Memory
buysellram.com·3d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Discrete Fourier Transform: Introduction (2020)
chciken.com·53m·
Discuss: Hacker News
🔐Zero-Knowledge Proofs
Flag this post
Ray Security – Predictive Data Security Platform
raysecurity.io·1h·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
OpenLoRa: Validating LoRa Implementations Through an Open-Sourced Framework
usenix.org·1d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
I Built a One File Edge Probe to Tell Me When Time Is Lying
physical-ai.ghost.io·3d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Ranking LLMs based on 180k French votes (French government's AI arena)
comparia.beta.gouv.fr·2d·
🦀Rust
Flag this post
ZkML Breakthrough: 13B Models Verified in 15 Minutes
lightcapai.medium.com·4d·
Discuss: Hacker News
🔐Zero-Knowledge Proofs
Flag this post
Automation via UEFI
vahidhashemi.com·21h·
Discuss: Hacker News
Formal Methods
Flag this post
Continuous Autoregressive Language Models
shaochenze.github.io·1d·
Discuss: Hacker News
Formal Methods
Flag this post
User Experience Is Computation
madebynathan.com·1d·
Discuss: Hacker News
CUDA
Flag this post
original ↗
blog.robbowley.net·1d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
My fan worked fine, so I gave it WiFi
ellis.codes·15h·
Discuss: Hacker News
CUDA
Flag this post
Flatpak Happenings
blog.sebastianwick.net·1d·
🐛Vulnerability Research
Flag this post
On Reed–Solomon Proximity Gaps Conjectures
eprint.iacr.org·20h
🔐Zero-Knowledge Proofs
Flag this post
Playing Around with ARM Assembly
blog.nobaralabs.com·2d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
OIDC workload identity on AWS
latacora.com·2d·
Discuss: Hacker News
🔒Cryptography
Flag this post