Tag: uth

  • Hacker News: GPON FTTH networks (in)security (2016)

    Source URL: https://pierrekim.github.io/blog/2016-11-01-gpon-ftth-networks-insecurity.html#introduction Source: Hacker News Title: GPON FTTH networks (in)security (2016) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text delves into the (in)security of GPON FTTH networks, particularly focusing on vulnerabilities inherent in devices like the Optical Network Terminal (ONT) used by major ISPs in France. It uncovers significant threats, including…

  • Simon Willison’s Weblog: Weeknotes: Starting 2025 a little slow

    Source URL: https://simonwillison.net/2025/Jan/4/weeknotes/#atom-everything Source: Simon Willison’s Weblog Title: Weeknotes: Starting 2025 a little slow Feedly Summary: I published my review of 2024 in LLMs and then got into a fight with most of the internet over the phone microphone targeted ads conspiracy theory. In my last weeknotes I talked about how December in LLMs has…

  • Simon Willison’s Weblog: Quoting Colin Fraser

    Source URL: https://simonwillison.net/2025/Jan/4/colin-fraser/#atom-everything Source: Simon Willison’s Weblog Title: Quoting Colin Fraser Feedly Summary: Claude is not a real guy. Claude is a character in the stories that an LLM has been programmed to write. Just to give it a distinct name, let’s call the LLM “the Shoggoth". When you have a conversation with Claude, what’s…

  • Simon Willison’s Weblog: Using LLMs and Cursor to become a finisher

    Source URL: https://simonwillison.net/2025/Jan/4/llms-and-cursor/#atom-everything Source: Simon Willison’s Weblog Title: Using LLMs and Cursor to become a finisher Feedly Summary: Using LLMs and Cursor to become a finisher Zohaib Rauf describes a pattern I’ve seen quite a few examples of now: engineers who moved into management but now find themselves able to ship working code again (at…

  • Simon Willison’s Weblog: What we learned copying all the best code assistants

    Source URL: https://simonwillison.net/2025/Jan/4/what-we-learned-copying-all-the-best-code-assistants/ Source: Simon Willison’s Weblog Title: What we learned copying all the best code assistants Feedly Summary: What we learned copying all the best code assistants Steve Krouse describes Val Town’s experience so far building features that use LLMs, starting with completions (powered by Codeium and Val Town’s own codemirror-codeium extension) and then…

  • Slashdot: US Sanctions Chinese Firm Linked to Seized Botnet

    Source URL: https://yro.slashdot.org/story/25/01/04/0431231/us-sanctions-chinese-firm-linked-to-seized-botnet Source: Slashdot Title: US Sanctions Chinese Firm Linked to Seized Botnet Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the recent sanctions imposed on a Beijing-based cybersecurity company, Integrity Technology, due to its involvement in cyberattacks, specifically those attributed to a Chinese government-operated botnet known as Flax Typhoon. This…

  • Wired: Apple May Owe You $20 in a Siri Privacy Lawsuit Settlement

    Source URL: https://www.wired.com/story/apple-95-million-siri-privacy-lawsuit/ Source: Wired Title: Apple May Owe You $20 in a Siri Privacy Lawsuit Settlement Feedly Summary: Plus: The FBI discovers a historic trove of homemade explosives, new details emerge in China’s hack of the US Treasury Department, and more. AI Summary and Description: Yes Summary: The text discusses a series of significant…

  • The Register: Atos denies Space Bears’ ransomware claims – with a ‘but’

    Source URL: https://www.theregister.com/2025/01/04/atos_denies_space_bears_ransomware/ Source: The Register Title: Atos denies Space Bears’ ransomware claims – with a ‘but’ Feedly Summary: Points finger at third-party infrastructure being breached French tech giant Atos today denied that Space Bears criminals breached its systems – but noted that third-party infrastructure was compromised by the ransomware crew, and that files accessed…

  • Hacker News: F-Droid Fake Signer PoC

    Source URL: https://github.com/obfusk/fdroid-fakesigner-poc Source: Hacker News Title: F-Droid Fake Signer PoC Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses vulnerabilities in the APK signing process for Android, specifically how certain implementations of fdroidserver and related tools can be exploited, leading to potential bypasses of certificate pinning. This is critical for professionals…

  • Hacker News: A path to O1 open source

    Source URL: https://arxiv.org/abs/2412.14135 Source: Hacker News Title: A path to O1 open source Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses advancements in artificial intelligence, particularly focusing on the reinforcement learning approach to reproduce OpenAI’s o1 model. It highlights key components like policy initialization, reward design, search, and learning that contribute…