- See Also
-
Links
- “Did I Get Sam Altman Fired from OpenAI?: Nathan's Redteaming Experience, Noticing How the Board Was Not Aware of GPT-4 Jailbreaks and Had Not Even Tried GPT-4 prior to Its Early Release”, Labenz 2023
- “Summon a Demon and Bind It: A Grounded Theory of LLM Red Teaming in the Wild”, Inie et al 2023
- “Beyond Memorization: Violating Privacy Via Inference With Large Language Models”, Staab et al 2023
- “The Ghost Trilemma”, Mukherjee et al 2023
- “An Empirical Study & Evaluation of Modern CAPTCHAs”, Searles et al 2023
- “Artificial Artificial Artificial Intelligence: Crowd Workers Widely Use Large Language Models for Text Production Tasks”, Veselovsky et al 2023
- “Generalizable Synthetic Image Detection via Language-guided Contrastive Learning”, Wu et al 2023
- “Large Language Models Can Be Used To Effectively Scale Spear Phishing Campaigns”, Hazell 2023
- “Dark Web Pedophile Site Users' Cybersecurity Concerns: A Lifespan and Survival Analysis”, Chopin & Décary-Hétu 2023
- “How Secure Is Code Generated by ChatGPT?”, Khoury et al 2023
- “Generative AI: Impact on Email Cyber-Attacks”, DarkTrace 2023
- “Protecting Society from AI Misuse: When Are Restrictions on Capabilities Warranted?”, Anderljung & Hazell 2023
- “ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards”, Alotaibi et al 2023
- “Not What You’ve Signed up For: Compromising Real-World LLM-Integrated Applications With Indirect Prompt Injection”, Greshake et al 2023
- “Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons”, Zehavi & Shamir 2023
- “EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers”, Mahdad et al 2022
- “Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing”, Liu et al 2022
- “Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models”, Struppek et al 2022
- “BTD: Decompiling X86 Deep Neural Network Executables”, Liu et al 2022
- “Uber Apparently Hacked by Teen, Employees Thought It Was a Joke: ‘I Think IT Would Appreciate Less Memes While They Handle the Breach’”, Porter 2022
- “Scammers Created an AI Hologram of Me to Scam Unsuspecting Projects”, Hillmann 2022
- “Adversarial Attacks on Image Generation With Made-Up Words”, Millière 2022
- “SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables”, Guri 2022
- “Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing”, Long et al 2022
- “Pop Quiz! Can a Large Language Model Help With Reverse Engineering?”, Pearce et al 2022
- “High Tech Crime, High Intellectual Crime? Comparing the Intellectual Capabilities of Cybercriminals, Traditional Criminals and Non-criminals”, Schiks et al 2022
- “Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on X86”, Wang et al 2022d
- “A Deep Dive into an NSO Zero-click IMessage Exploit: Remote Code Execution”, Beer & Groß 2021
- “Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED”, Nassi et al 2021
- “EvilModel: Hiding Malware Inside of Neural Network Models”, Wang et al 2021
- “Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine”, Johnson 2021
- “I Know What You Bought At Chipotle for $9.81 by Solving A Linear Inverse Problem”, Fleder & Shah 2020
- “The Relevance of Classic Fuzz Testing: Have We Solved This One?”, Miller et al 2020
- “Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations”, Nassi et al 2020
- “Psychic Paper”, Siguza 2020
- “The Voluntariness of Voluntary Consent: Consent Searches and the Psychology of Compliance”, Sommers & Bohns 2019
- “Spectre Is Here to Stay: An Analysis of Side-channels and Speculative Execution”, Mcilroy et al 2019
- “V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing”, Li et al 2019
- “ExSpectre: Hiding Malware in Speculative Execution”, Wampler 2019
- “Best Practices: Formal Proofs, the Fine Print and Side Effects”, Murray & Oorschot 2018
- “SonarSnoop: Active Acoustic Side-Channel Attacks”, Cheng et al 2018
- “Chaff Bugs: Deterring Attackers by Making Software Buggier”, Hu et al 2018
- “Bad Romance: To Cash in on Kindle Unlimited, a Cabal of Authors Gamed Amazon’s Algorithm”, Jeong 2018
- “Kindle Unlimited Book Stuffing Scam Earns Millions and Amazon Isn’t Stopping It: Book Stuffer Chance Carter Is Gone. But Readers Are Still Paying for Books That Are 90% Filler.”, Zetlin 2018
- “Security, Moore’s Law, and the Anomaly of Cheap Complexity”, Flake 2018
- “Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning”, Anderson et al 2018
- “Deep Reinforcement Fuzzing”, Böttinger et al 2018
- “Weird Machines, Exploitability, and Provable Unexploitability”, Dullien 2017
- “The Future of Ad Blocking: An Analytical Framework and New Techniques”, Storey et al 2017
- “Research Ideas”, Gwern 2017
- “The Search for the Perfect Door”, Ollam 2016
- “Join Me on a Market for Anonymity”, Moser & Böhme 2016
- “When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries”, Caliskan et al 2015
- “Microsoft Sheds Reputation As an Easy Mark for Hackers”, Wingfield 2015
- “Antikernel: A Decentralized Secure Hardware-software Operating System Architecture”, Zonenberg 2015
- “What Are Weird Machines?”, Bratus 2015
- “Bloom Filter Applications in Network Security: A State-of-the-art Survey”, Geravand & Ahmadi 2013
- “The Page-Fault Weird Machine: Lessons in Instruction-less Computation”, Bangert 2013
- “On Seeing Through and Unseeing: The Hacker Mindset”, Gwern 2012
- “Exploitation and State Machines: Programming the ‘Weird Machine’ Revisited”, Flake 2011
- “Digital Image Forensics: a Booklet for Beginners”, Redi et al 2010
- “Why I’m Not an Entropist”, Syverson 2009
- “Orangutans, Resistance and the Zoo”, Hribal 2008
- “How To Break Anonymity of the Netflix Prize Dataset”, Narayanan & Shmatikov 2006
- “Oral History of Butler Lampson § WWW”, Lampson & Kay 2006 (page 36)
- “Toward a Broader View of Security Protocols”, Blaze 2004
- “Privacy, Economics, and Price Discrimination on the Internet”, Odlyzko 2003
- “30 Years Later: Lessons from the Multics Security Evaluation”, Karger & Schell 2002
- “Timing Attacks on Web Privacy”, Felten & Schneider 2000
- “An Empirical Study of the Reliability of UNIX Utilities”, Miller et al 1990
- “FRACTRAN: A Simple Universal Programming Language for Arithmetic”, Conway 1987
- “StarCraft: Remastered—Emulating a Buffer Overflow for Fun and Profit”
- “Appendix F: Personal Observations on the Reliability of the Shuttle”
- “Trusted Third Parties Are Security Holes”, Szabo 2023
- “Control-Flow Bending: On the Effectiveness of Control-Flow Integrity”
- “Furiosa’s Cat Feeder: The Trick Is to Be Smarter Than the Animal With a Brain the Size of a Walnut”
- “Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—and Concealed Gross Human Rights Violations.”
- Sort By Magic
- Wikipedia
- Miscellaneous
- Link Bibliography
See Also
Links
“Did I Get Sam Altman Fired from OpenAI?: Nathan's Redteaming Experience, Noticing How the Board Was Not Aware of GPT-4 Jailbreaks and Had Not Even Tried GPT-4 prior to Its Early Release”, Labenz 2023
“Summon a Demon and Bind It: A Grounded Theory of LLM Red Teaming in the Wild”, Inie et al 2023
“Summon a Demon and Bind it: A Grounded Theory of LLM Red Teaming in the Wild”
“Beyond Memorization: Violating Privacy Via Inference With Large Language Models”, Staab et al 2023
“Beyond Memorization: Violating Privacy Via Inference with Large Language Models”
“The Ghost Trilemma”, Mukherjee et al 2023
“An Empirical Study & Evaluation of Modern CAPTCHAs”, Searles et al 2023
“Artificial Artificial Artificial Intelligence: Crowd Workers Widely Use Large Language Models for Text Production Tasks”, Veselovsky et al 2023
“Generalizable Synthetic Image Detection via Language-guided Contrastive Learning”, Wu et al 2023
“Generalizable Synthetic Image Detection via Language-guided Contrastive Learning”
“Large Language Models Can Be Used To Effectively Scale Spear Phishing Campaigns”, Hazell 2023
“Large Language Models Can Be Used To Effectively Scale Spear Phishing Campaigns”
“Dark Web Pedophile Site Users' Cybersecurity Concerns: A Lifespan and Survival Analysis”, Chopin & Décary-Hétu 2023
“Dark web pedophile site users' cybersecurity concerns: A lifespan and survival analysis”
“How Secure Is Code Generated by ChatGPT?”, Khoury et al 2023
“Generative AI: Impact on Email Cyber-Attacks”, DarkTrace 2023
“Protecting Society from AI Misuse: When Are Restrictions on Capabilities Warranted?”, Anderljung & Hazell 2023
“Protecting Society from AI Misuse: When are Restrictions on Capabilities Warranted?”
“ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards”, Alotaibi et al 2023
“Not What You’ve Signed up For: Compromising Real-World LLM-Integrated Applications With Indirect Prompt Injection”, Greshake et al 2023
“Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons”, Zehavi & Shamir 2023
“EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers”, Mahdad et al 2022
“EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers”
“Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing”, Liu et al 2022
“Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing”
“Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models”, Struppek et al 2022
“Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models”
“BTD: Decompiling X86 Deep Neural Network Executables”, Liu et al 2022
“Uber Apparently Hacked by Teen, Employees Thought It Was a Joke: ‘I Think IT Would Appreciate Less Memes While They Handle the Breach’”, Porter 2022
“Scammers Created an AI Hologram of Me to Scam Unsuspecting Projects”, Hillmann 2022
“Scammers Created an AI Hologram of Me to Scam Unsuspecting Projects”
“Adversarial Attacks on Image Generation With Made-Up Words”, Millière 2022
“Adversarial Attacks on Image Generation With Made-Up Words”
“SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables”, Guri 2022
“SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables”
“Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing”, Long et al 2022
“Pop Quiz! Can a Large Language Model Help With Reverse Engineering?”, Pearce et al 2022
“Pop Quiz! Can a Large Language Model Help With Reverse Engineering?”
“High Tech Crime, High Intellectual Crime? Comparing the Intellectual Capabilities of Cybercriminals, Traditional Criminals and Non-criminals”, Schiks et al 2022
“Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on X86”, Wang et al 2022d
“Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86”
“A Deep Dive into an NSO Zero-click IMessage Exploit: Remote Code Execution”, Beer & Groß 2021
“A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution”
“Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED”, Nassi et al 2021
“Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED”
“EvilModel: Hiding Malware Inside of Neural Network Models”, Wang et al 2021
“Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine”, Johnson 2021
“I Know What You Bought At Chipotle for $9.81 by Solving A Linear Inverse Problem”, Fleder & Shah 2020
“I Know What You Bought At Chipotle for $9.81 by Solving A Linear Inverse Problem”
“The Relevance of Classic Fuzz Testing: Have We Solved This One?”, Miller et al 2020
“The Relevance of Classic Fuzz Testing: Have We Solved This One?”
“Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations”, Nassi et al 2020
“Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations”
“Psychic Paper”, Siguza 2020
“The Voluntariness of Voluntary Consent: Consent Searches and the Psychology of Compliance”, Sommers & Bohns 2019
“The Voluntariness of Voluntary Consent: Consent Searches and the Psychology of Compliance”
“Spectre Is Here to Stay: An Analysis of Side-channels and Speculative Execution”, Mcilroy et al 2019
“Spectre is here to stay: An analysis of side-channels and speculative execution”
“V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing”, Li et al 2019
“ExSpectre: Hiding Malware in Speculative Execution”, Wampler 2019
“Best Practices: Formal Proofs, the Fine Print and Side Effects”, Murray & Oorschot 2018
“Best Practices: Formal Proofs, the Fine Print and Side Effects”
“SonarSnoop: Active Acoustic Side-Channel Attacks”, Cheng et al 2018
“Chaff Bugs: Deterring Attackers by Making Software Buggier”, Hu et al 2018
“Chaff Bugs: Deterring Attackers by Making Software Buggier”
“Bad Romance: To Cash in on Kindle Unlimited, a Cabal of Authors Gamed Amazon’s Algorithm”, Jeong 2018
“Bad romance: To cash in on Kindle Unlimited, a cabal of authors gamed Amazon’s algorithm”
“Kindle Unlimited Book Stuffing Scam Earns Millions and Amazon Isn’t Stopping It: Book Stuffer Chance Carter Is Gone. But Readers Are Still Paying for Books That Are 90% Filler.”, Zetlin 2018
“Security, Moore’s Law, and the Anomaly of Cheap Complexity”, Flake 2018
“Security, Moore’s law, and the anomaly of cheap complexity”
“Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning”, Anderson et al 2018
“Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning”
“Deep Reinforcement Fuzzing”, Böttinger et al 2018
“Weird Machines, Exploitability, and Provable Unexploitability”, Dullien 2017
“Weird machines, exploitability, and provable unexploitability”
“The Future of Ad Blocking: An Analytical Framework and New Techniques”, Storey et al 2017
“The Future of Ad Blocking: An Analytical Framework and New Techniques”
“Research Ideas”, Gwern 2017
“The Search for the Perfect Door”, Ollam 2016
“Join Me on a Market for Anonymity”, Moser & Böhme 2016
“When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries”, Caliskan et al 2015
“When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries”
“Microsoft Sheds Reputation As an Easy Mark for Hackers”, Wingfield 2015
“Antikernel: A Decentralized Secure Hardware-software Operating System Architecture”, Zonenberg 2015
“Antikernel: A decentralized secure hardware-software operating system architecture”
“What Are Weird Machines?”, Bratus 2015
“Bloom Filter Applications in Network Security: A State-of-the-art Survey”, Geravand & Ahmadi 2013
“Bloom filter applications in network security: A state-of-the-art survey”
“The Page-Fault Weird Machine: Lessons in Instruction-less Computation”, Bangert 2013
“The Page-Fault Weird Machine: Lessons in Instruction-less Computation”
“On Seeing Through and Unseeing: The Hacker Mindset”, Gwern 2012
“Exploitation and State Machines: Programming the ‘Weird Machine’ Revisited”, Flake 2011
“Exploitation and State Machines: Programming the ‘Weird Machine’ Revisited”
“Digital Image Forensics: a Booklet for Beginners”, Redi et al 2010
“Why I’m Not an Entropist”, Syverson 2009
“Orangutans, Resistance and the Zoo”, Hribal 2008
“How To Break Anonymity of the Netflix Prize Dataset”, Narayanan & Shmatikov 2006
“Oral History of Butler Lampson § WWW”, Lampson & Kay 2006 (page 36)
“Toward a Broader View of Security Protocols”, Blaze 2004
“Privacy, Economics, and Price Discrimination on the Internet”, Odlyzko 2003
“Privacy, Economics, and Price Discrimination on the Internet”
“30 Years Later: Lessons from the Multics Security Evaluation”, Karger & Schell 2002
“30 years later: lessons from the Multics security evaluation”
“Timing Attacks on Web Privacy”, Felten & Schneider 2000
“An Empirical Study of the Reliability of UNIX Utilities”, Miller et al 1990
“FRACTRAN: A Simple Universal Programming Language for Arithmetic”, Conway 1987
“FRACTRAN: A Simple Universal Programming Language for Arithmetic”
“StarCraft: Remastered—Emulating a Buffer Overflow for Fun and Profit”
“StarCraft: Remastered—Emulating a buffer overflow for fun and profit”
“Appendix F: Personal Observations on the Reliability of the Shuttle”
“Appendix F: Personal Observations on the Reliability of the Shuttle”
“Trusted Third Parties Are Security Holes”, Szabo 2023
“Control-Flow Bending: On the Effectiveness of Control-Flow Integrity”
“Control-Flow Bending: On the Effectiveness of Control-Flow Integrity”
“Furiosa’s Cat Feeder: The Trick Is to Be Smarter Than the Animal With a Brain the Size of a Walnut”
“Furiosa’s Cat Feeder: The trick is to be smarter than the animal with a brain the size of a walnut”
“Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—and Concealed Gross Human Rights Violations.”
Sort By Magic
Annotations sorted by machine learning into inferred 'tags'. This provides an alternative way to browse: instead of by date order, one can browse in topic order. The 'sorted' list has been automatically clustered into multiple sections & auto-labeled for easier browsing.
Beginning with the newest annotation, it uses the embedding of each annotation to attempt to create a list of nearest-neighbor annotations, creating a progression of topics. For more details, see the link.
cybersecurity
infosec
sidechannel
exploitability
malware
Wikipedia
Miscellaneous
-
/doc/cs/security/2012-02-12-arvindnarayanan-iswritingstylesufficienttodeanonymizematerialonline.html
-
/doc/ai/2003-11-07-clayshirky-thesemanticwebsyllogismandworldview.html
-
http://itre.cis.upenn.edu/%7Emyl/languagelog/archives/003289.html
-
http://www.ranum.com/security/computer_security/editorials/dumb/
-
https://cacm.acm.org/magazines/2023/6/273222-the-silent-revolution-of-sat/fulltext
-
https://dropbox.tech/machine-learning/prompt-injection-with-control-characters-openai-chatgpt-llm
-
https://engineering.atspotify.com/2013/06/creative-usernames/
-
https://erights.medium.com/norm-hardys-place-in-history-cecf191df641
-
https://flak.tedunangst.com/post/a-brief-history-of-one-line-fixes
-
https://lcamtuf.blogspot.com/2014/11/pulling-jpegs-out-of-thin-air.html
-
https://medium.com/tenable-techblog/g-3po-a-protocol-droid-for-ghidra-4b46fa72f1ff
-
https://micahflee.com/2023/04/capturing-the-flag-with-gpt-4/
-
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34718
-
https://official-kircheis.tumblr.com/post/682013772643254272/jadagul-prokopetz-repost-this-image
-
https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/
-
https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/
-
https://semiengineering.com/uneven-circuit-aging-becoming-a-bigger-problem/
-
https://simonwillison.net/2023/Oct/14/multi-modal-prompt-injection/
-
https://taskandpurpose.com/culture/realistic-aerial-combat-movie-patlabor-2/
-
https://tedium.co/2023/07/19/tamper-evident-jar-safety-button-history/
-
https://thezvi.substack.com/p/jailbreaking-the-chatgpt-on-release
-
https://twitter.com/atlantis__labs/status/1677782219937525760
-
https://twitter.com/ludwig_stumpp/status/1619701277419794435
-
https://twitter.com/philhawksworth/status/1720106515300860230
-
https://twitter.com/tobiaschneider/status/957765269316886528
-
https://web.archive.org/web/20100322192300/http://33bits.org/2010/03/15/open-letter-to-netflix/
-
https://www.astralcodexten.com/p/perhaps-it-is-a-bad-thing-that-the
-
https://www.brightball.com/articles/waste-spammers-time-to-reduce-their-return-on-investment
-
https://www.cerias.purdue.edu/site/blog/post/reflecting_on_the_internet_worm_at_35/
-
https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html
-
https://www.ietf.org/archive/id/draft-farrell-tenyearsafter-00.html
-
https://www.juliansanchez.com/2009/12/08/the-redactors-dilemma/
-
https://www.lesswrong.com/posts/KSroBnxCHodGmPPJ8/jailbreaking-gpt-4-s-code-interpreter
-
https://www.lesswrong.com/posts/pNcFYZnPdXyL2RfgA/using-gpt-eliezer-against-chatgpt-jailbreaking
-
https://www.newyorker.com/news/annals-of-inquiry/how-to-find-a-missing-person-with-dementia
-
https://www.nytimes.com/2014/08/12/upshot/heres-why-stealing-cars-went-out-of-fashion.html
-
https://www.reddit.com/r/ChatGPT/comments/10tevu1/new_jailbreak_proudly_unveiling_the_tried_and/
-
https://www.reddit.com/r/GPT3/comments/10wp00c/im_not_playing_with_dan_anymore/
-
https://www.reddit.com/r/GPT3/comments/zb4msc/speaking_to_chatgpt_in_perfect_danish_while_it/
-
https://www.reddit.com/r/ProgrammerHumor/comments/145nduh/kiss/
-
https://www.schneier.com/blog/archives/2023/04/llms-and-phishing.html
-
https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/
Link Bibliography
-
https://cognitiverevolution.substack.com/p/did-i-get-sam-altman-fired-from-openai
: “Did I Get Sam Altman Fired from OpenAI?: Nathan's Redteaming Experience, Noticing How the Board Was Not Aware of GPT-4 Jailbreaks and Had Not Even Tried GPT-4 prior to Its Early Release”, Nathan Labenz -
https://arxiv.org/abs/2305.06972
: “Large Language Models Can Be Used To Effectively Scale Spear Phishing Campaigns”, Julian Hazell -
https://arxiv.org/abs/2212.04732
: “Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing”, Zhe Liu, Chunyang Chen, Junjie Wang, Xing Che, Yuekai Huang, Jun Hu, Qing Wang -
https://www.binance.com/en/blog/community/scammers-created-an-ai-hologram-of-me-to-scam-unsuspecting-projects-6406050849026267209
: “Scammers Created an AI Hologram of Me to Scam Unsuspecting Projects”, Patrick Hillmann -
2022-wang-4.pdf
: “Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on X86”, Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner -
idea
: “Research Ideas”, Gwern -
https://www.cs.dartmouth.edu/~sergey/wm/
: “What Are Weird Machines?”, Sergey Bratus -
unseeing
: “On Seeing Through and Unseeing: The Hacker Mindset”, Gwern -
https://archive.computerhistory.org/resources/text/Oral_History/Lampson_Butler/102658024.05.01.pdf#page=36
: “Oral History of Butler Lampson § WWW”, Butler Lampson, Alan Kay -
2002-karger.pdf
: “30 Years Later: Lessons from the Multics Security Evaluation”, Paul A. Karger, Roger R. Schell