Posts
2962
Following
697
Followers
1542
"I'm interested in all kinds of astronomy."
@realn2s Exactly my thoughts when I read that headline. Hell, my watch can decrypt Enigma!
0
1
1
repeated
Edited 7 months ago

Just read an article from an influencer musing on the Innovative power of AI.
(Edit 2: while linked articles a current / May 2025 they refer to an event in 2017 🤪 )

Tasked with breaking the Enigma code, an AI system trained to recognise German using Grimm’s fairytales, utilizing 2,000 virtual servers, cracked a coded message in 13 minutes.

Let's pause for a second to let it sink.

And let's think for a second

Alan Turing “Bombes” could decipher two messages every minute.

😱 Suddenly the AI result isn't all that impressive any more.
AI cuts out all the research, knowledge gain, and insight. With all the resources available today, it still performs worse than a solution from 70 years ago (to be precise 26 times).
And this is seen as an impressive innovation 🤡🤯

"Sources":
Influencer post https://mastodon.social/@Caramba1/114470245795906227
Guardian article
https://www.theguardian.com/science/2025/may/07/todays-ai-can-crack-second-world-war-enigma-code-in-short-order-experts-say

9
11
0
repeated

Biting the CHERI bullet: Blockers, Enablers and Security Implications of CHERI in Defence

https://arxiv.org/pdf/2504.17904

0
1
0
repeated

Trend Zero Day Initiative

An analysis of CVE-2024-44236 - an RCE in macOS due to the lack of proper validation of “lutAToBType” and “lutBToAType” tag types. Read the details, see the source code review, and get detection guidance at https://www.zerodayinitiative.com/blog/2025/5/7/cve-2024-44236-remote-code-execution-vulnerability-in-apple-macos

0
2
0
repeated

Get your macOS 15.4 xnu CodeQL database here! 👩‍🔬

Also NOW includin the compile_commands.json 🎉

(I also wrote a util for converting the paths github.com/blacktop/ccpaths)

`ccpaths JSON /Users/runner/work/darwin-xnu-build/darwin-xnu-build /path/to/your/xnu`

https://github.com/blacktop/darwin-xnu-build/releases/tag/v15.4

0
3
0
repeated

I've been experimenting with improving Binary Ninja's analysis of Objective-C code recently. Having the ability to hide Obj-C runtime reference counting calls, and apply type information based on [super init] and objc_alloc_init calls can dramatically improve the readability (and in some cases even accuracy!) of the decompiled code.

https://github.com/bdash/bn-objc-extras

1
3
0
repeated

real tournament when unreal tournament walks in 💽 --> 39c3

shoutout to TCP/IP
0
5
0
repeated
One would think the rational cause of CS layoffs (instead of the bullshit AI narrative being pushed) is the shaken customer trust following The Whoopsie, but of course infosec is not a rational economy.
0
0
2
repeated

only FOUR DAYS left in our spring tea party coding event!

help create a template, theme, or layout for new and seasoned website owners to create their own websites easily!

submissions close may 11!~

https://32bit.cafe/spring25/

0
1
0
repeated
@cR0w Stahanovist CTI never stops, the new goal is 200%! For the People, for the Party!
0
0
1
repeated

For context: just three days ago CrowdStrike said it delivered "record full year operating cash flow of $1.38 billion and record full year free cash flow of $1.07 billion."

And CEO George Kurtz made $46 million last year.

https://aflcio.org/paywatch/CRWD & https://ir.crowdstrike.com/news-releases/news-release-details/crowdstrike-reports-fourth-quarter-and-fiscal-year-2025

2
5
0
repeated

I’m sorry, but Facebook did more harm to humankind than all NSO-alike spyware vendors of the world altogether. You are fighting into the wrong direction

3
2
0
@cybersecboardrm "security threat posed by artificial intelligence and the growing use of AI"
0
0
1
repeated
Edited 7 months ago

Next Thursday, May 15 at @NorthSec in Montreal, I will be hosting the workshop "Reconstructing Rust Types: A Practical Guide for Reverse Engineers"! This will be a 3-hour workshop how to approach Rust types and data structures when reversing Rust binaries. See https://nsec.io/session/2025-reconstructing-rust-types-a-practical-guide-for-reverse-engineers.html for more details!

Workshops at NorthSec will be streamed on YouTube Live. My workshop is scheduled for 1300-1600 EDT (UTC-4) on Thursday, May 15 in the Workshop 2 track, in Salle de la Commune. The stream link for all the Thursday Salle de la Commune workshops is here: https://www.youtube.com/watch?v=UwJgS32Q6As&list=PLuUtcRxSUZUrW9scJZqhbiuTBwZBJ-Qic&index=7

Looking forward to seeing folks there! 🦀

(Edited since I can't count days of the week apparently: May 15, which is when my workshop is occurring, is a Thursday, not a Wednesday.)

1
8
0
@mainframed767 journalist: "AI may help people overcome sleep deprivation"
0
0
1
[RSS] Jury orders NSO Group to pay $168 million to WhatsApp for facilitating Pegasus hacks of its users

https://therecord.media/jury-orders-nso-to-pay-meta-168-million-over-whatsapp-hack
0
0
1
KVM: VMX: Mark Intel PT virtualization as BROKEN

https://lore.kernel.org/all/bb0a1948-d418-4720-97bf-4aceb30ea787@intel.com/t/#u

Guess I'll just run the fuzzer on the host then?
0
0
1
[RSS] Security Bulletin: IBM i is vulnerable to an authentication and authorization attack due to incorrect validation processing in IBM i Netserver [CVE-2025-3218].

https://www.ibm.com/support/pages/node/7232750?myns=swgother&mynp=OCSWG60&mynp=OCSSC5L9&mynp=OCSSKWKM&mynp=OCSSTS2D&mynp=OCSSB23CE&mynp=OCSS9QQS&mync=A&cm_sp=swgother-_-OCSWG60-OCSSC5L9-OCSSKWKM-OCSSTS2D-OCSSB23CE-OCSS9QQS-_-A

The Zen and Art of Obfuscating Vulnerability Information (CWE-295?!)
0
0
2
Show older