Tag: encoding

  • Hacker News: Towards a test-suite for TOTP codes

    Source URL: https://shkspr.mobi/blog/2025/03/towards-a-test-suite-for-totp-codes/ Source: Hacker News Title: Towards a test-suite for TOTP codes Feedly Summary: Comments AI Summary and Description: Yes Summary: The text critiques the TOTP (Time-based One-Time Password) specification, highlighting discrepancies between major implementations and emphasizing the need for consistency in security standards. The author has created a test suite to help identify…

  • Simon Willison’s Weblog: llm-anthropic #24: Use new URL parameter to send attachments

    Source URL: https://simonwillison.net/2025/Mar/1/llm-anthropic/#atom-everything Source: Simon Willison’s Weblog Title: llm-anthropic #24: Use new URL parameter to send attachments Feedly Summary: llm-anthropic #24: Use new URL parameter to send attachments Anthropic released a neat quality of life improvement today. Alex Albert: We’ve added the ability to specify a public facing URL as the source for an image…

  • Hacker News: Implementing LLaMA3 in 100 Lines of Pure Jax

    Source URL: https://saurabhalone.com/blogs/llama3/web Source: Hacker News Title: Implementing LLaMA3 in 100 Lines of Pure Jax Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides a comprehensive tutorial on implementing the LLaMA 3 language model using JAX, emphasizing its functional programming nature and its suitability for educational purposes. This tutorial is particularly relevant…

  • Cisco Talos Blog: ClearML and Nvidia vulns

    Source URL: https://blog.talosintelligence.com/clearml-and-nvidia-vulns/ Source: Cisco Talos Blog Title: ClearML and Nvidia vulns Feedly Summary: Cisco Talos’ Vulnerability Discovery & Research team recently disclosed two vulnerabilities in ClearML and four vulnerabilities in Nvidia. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy.   For Snort…

  • Hacker News: Smuggling arbitrary data through an emoji

    Source URL: https://paulbutler.org/2025/smuggling-arbitrary-data-through-an-emoji/ Source: Hacker News Title: Smuggling arbitrary data through an emoji Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses an interesting method of encoding data using Unicode characters, specifically through the application of variation selectors. This approach demonstrates a theoretical ability to embed arbitrary data within standard text representations,…

  • The GenAI Bug Bounty Program | 0din.ai: The GenAI Bug Bounty Program

    Source URL: https://0din.ai/blog/odin-secures-the-future-of-ai-shopping Source: The GenAI Bug Bounty Program | 0din.ai Title: The GenAI Bug Bounty Program Feedly Summary: AI Summary and Description: Yes Summary: This text delves into a critical vulnerability uncovered in Amazon’s AI assistant, Rufus, focusing on how ASCII encoding allowed malicious requests to bypass existing guardrails. It emphasizes the need for…