How many malicious docs does it take to poison an LLM? Far fewer than you might think, Anthropic warns
techradar.comยท3h
๐ต๏ธVector Smuggling
Flag this post
LibreSSL 4.2.0 Released
bsdsec.netยท9h
๐งชBinary Fuzzing
Flag this post
Financial, Other Industries Urged to Prepare for Quantum Computers
darkreading.comยท1d
๐Quantum Security
Flag this post
How bad can a $2.97 ADC be?
๐ฏEmulation Accuracy
Flag this post
Ask HN: Open framework for generating thumbnails on untrusted files?
๐งชArchive Fuzzing
Flag this post
FCFZ: Compatible Flipper Zero
๐ฎSwitch Archaeology
Flag this post
Absolute Scale Corrupts (2019)
๐Hacking
Flag this post
Completing a new BASIC interpreter in 2025 (strings, math funcs, cassette)
๐บVT100 Emulation
Flag this post
The โPixnappingโ Attack Can Steal Your 2FA Codes
lifehacker.comยท5h
๐Password Cracking
Flag this post
Lens-Based Topological Protection for Enhancing Robustness in Quantum Computation
โ๏ธQuantum Error Correction
Flag this post
Private Graphs, Public Insights: Feature Propagation with a Twist by Arvind Sundararajan
๐ธ๏ธGraph Embeddings
Flag this post
How I Built a Custom AI Voice Agent by Combining Deepgram, OpenAI, and ElevenLabs
๐๏ธWhisper
Flag this post
Mastering Midjourney: A Professional Photography Prompt Generator for Developers
๐ธTIFF Evolution
Flag this post
Information Topology
arxiv.orgยท20h
๐Archive Topology
Flag this post
ReFIne: A Framework for Trustworthy Large Reasoning Models with Reliability, Faithfulness, and Interpretability
arxiv.orgยท1d
๐ก๏ธProof-Carrying Archives
Flag this post
Loading...Loading more...