turing-complete#security-implications
[Transclude the forward-link's
context]
Networks All the Way Down
Welcome to the Jungle: Or, A Heterogeneous Supercomputer in Every Pocket
Warehouse-Scale Video Acceleration (Argos): Co-design and Deployment in the Wild
Stack
https://news.ycombinator.com/item?id=19348141
Security, Moore’s law, and the anomaly of cheap complexity
The Wheel of Reincarnation
Core I9-7900X
Platform Embedded Security Technology Revealed [Slides]
Platform Embedded Security Technology Revealed [Book]
Project Zero: Trust Issues: Exploiting TrustZone TEEs
Titan in Depth: Security in Plaintext
Google Working To Remove MINIX-Based ME From Intel Platforms
Nonlinear Computation in Deep Linear Networks
Adversarial Reprogramming of Neural Networks
Adversarial Reprogramming of Text Classification Neural Networks
gpt-3#prompt-programming
[Transclude the forward-link's
context]
Inductive Biases for Deep Learning of Higher-Level Cognition
Pretrained Transformers as Universal Computation Engines
Machine Teaching for Bayesian Learners in the Exponential Family
Machine Teaching: an Inverse Problem to Machine Learning and an Approach Toward Optimal Education
Dataset Distillation
"Less Than One"-Shot Learning: Learning n Classes From M < N Samples
Layered Security for Your Next SoC
https://x.com/_markel___/status/982364102449393668
Apple’s T2 Security Chip Has an Unfixable Flaw: Checkm8 Vulnerability Used to Jailbreak IPhones Hits Macs As Well.
https://x.com/qwertyoruiopz/status/1238606353645666308
Always-On Processor Magic: How Find My Works While IPhone Is Powered Off
Hey Siri: An On-Device DNN-Powered Voice Trigger for Apple’s Personal Assistant
Hardware Backdoors in Some X86 CPUs
https://www.alchemistowl.org/arrigo/Papers/Arrigo-Triulzi-PACSEC08-Project-Maux-II.pdf
https://www.alchemistowl.org/arrigo/Papers/Arrigo-Triulzi-CANSEC10-Project-Maux-III.pdf
Cellphone Guts for the Curious ...
Malware-Flingers Can Pwn Your Mobile With Over-The-Air Updates; German Fed-Sponsored Boffins: They Have Ways of Hearing You Talk
Hard Disk Hacking—Intro
Macbook Charger Teardown: The Surprising Complexity inside Apple's Power Adapter
MSP430F2003: 16-Bit Ultra-Low-Power Microcontroller, 1kB Flash, 128B RAM, 16-Bit Sigma-Delta A/D, USI for SPI/I2C
On Hacking MicroSD Cards
Over The Air: Exploiting Broadcom's Wi-Fi Stack (Part 2)
On the Design of Display Processors
https://news.ycombinator.com/item?id=18413757
https://habr.com/en/articles/429602/
Open Source Firmware
Your Computer Is a Distributed System
Putting out the hardware dumpster fire
Warehouse-Scale Computers to Exploit Request-Level and Data-Level Parallelism
https://danluu.com/deconstruct-files/