via Schneier on Security
Did
recent
events
leave you wondering “how could LLMs be useful for spying on citizens”? Here’s
just one concrete example.
We show that from a handful of comments, LLMs can infer where you live, what you
do, and your interests – then search for you on the web. In our new research, we
show that this is not only possible but increasingly practical.
Check out the full paper for details.
Buddy Guy brought the house down at Tiny Desk, with a feature from
rising-superstar Miles Caton.
Once again, thank you Sinners.
via Bas Westerbaan
A curated and crowdsourced list of ~*fancy*~ cryptography protocols,
currently deployed at scale.
Some rabbit holes I’m falling down:
A super bowl chaser. The only thing more powerful than hate is love.
Advice as old as time but I often forget. Placed well in the context of today’s
workplace.
Hidden in storage, a University of Utah research associate happened upon the only known copy of this ‘revolutionary’ software
Stories like this revitalize my love for computing PLUS it’s great seeing the Flux research group highlighted 🫶.
A cool reminder that Let’s Encrypt, Divvi Up, and Prossimo are all run by the same org.
The legendary Melissa Chase recently gave a perfect introduction to Key Transparency, including recent results/active areas.
From USENIX Security 2005!
without [secure deallocation], data can remain in memory for days or weeks,
even persisting across reboots.
The span from first write to last read is the ideal lifetime. The data
must exist in the system at least this long. The span from first write to
deallocation is the secure deallocation lifetime. The span from first write
to the first write of the next allocation is the natural lifetime. Because
programs often rely on reallocation and overwrite to eliminate sensitive data,
the natural lifetime is the expected data lifetime in systems without secure
deallocation.