Bibliography:

  1. ‘CS’ tag

  2. ‘adversarial examples (AI)’ tag

  3. ‘Bitcoin’ tag

  4. ‘Emacs’ tag

  5. ‘stylometry’ tag

  6. Research Ideas

  7. On Seeing Through and Unseeing: The Hacker Mindset

  8. Clio: Privacy-Preserving Insights into Real-World AI Use

  9. Emacs Arbitrary Code Execution and How to Avoid It

  10. When Machine Learning Tells the Wrong Story

  11. Hacking Back the AI-Hacker: Prompt Injection as a Defense Against LLM-driven Cyberattacks

  12. The Global Surveillance Free-For-All in Mobile Ad Data

  13. Internet Archive breached again through stolen access tokens

  14. Project Zero: From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code

  15. Turning Everyday Gadgets into Bombs Is a Bad Idea

  16. 84e59939d87761a2a8be39f47b1e689d55efb082.html

  17. Meet the Hustlers Who Make $6,000 a Month Riding Citi Bikes

  18. Magika: AI-Powered Content-Type Detection

  19. PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via ‘Singing Pixels’

  20. From World Champions to State Assets: The Outsized Impact of a Few Chinese Hackers

  21. a07a4ce82f4a5cf3b49fba4a68a3c0a9dec12b57.html

  22. How Elon Musk Got Tangled Up in Blue § homoglyph attack

  23. Prompt Injection in ‘Resolve Vulnerabilty’ Results in Arbitrary Command Execution in Victim’s Pipeline

  24. A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too: A security breach at the maker of ChatGPT last year revealed internal discussions among researchers and other employees, but not the code behind OpenAI’s systems

  25. The Strange Journey of John Lennon’s Stolen Patek Philippe Watch: For decades, Yoko Ono thought that the birthday gift was in her Dakota apartment. But it had been removed and sold—and now awaits a court ruling in Geneva

  26. Designing a Dashboard for Transparency and Control of Conversational AI

  27. he West Coast’s Fanciest Stolen Bikes Are Getting Trafficked by One Mastermind in Jalisco, Mexico: ‘We have people stealing all over the world.’ A digital sleuth named Bryan Hance has spent the past four years obsessively uncovering a bicycle-theft pipeline of astonishing scale

  28. AI Sandbagging: Language Models can Strategically Underperform on Evaluations

  29. The Instruction Hierarchy: Training LLMs to Prioritize Privileged Instructions

  30. Foundational Challenges in Assuring Alignment and Safety of Large Language Models

  31. Vulnerability Detection with Code Language Models: How Far Are We?

  32. The NSA Warns That US Adversaries Free to Mine Private Data May Have an AI Edge: Gilbert Herrera, who leads research at the National Security Agency, says large language models are incredibly useful—and a bit of a headache—for America’s intelligence machine

  33. Exploiting Novel GPT-4 APIs

  34. Did I get Sam Altman fired from OpenAI?: Nathan’s red-teaming experience, noticing how the board was not aware of GPT-4 jailbreaks & had not even tried GPT-4 prior to its early release

  35. Did I get Sam Altman fired from OpenAI? § GPT-4-base

  36. Summon a Demon and Bind it: A Grounded Theory of LLM Red Teaming in the Wild

  37. Tensor Trust: Interpretable Prompt Injection Attacks from an Online Game

  38. InCharacter: Evaluating Personality Fidelity in Role-Playing Agents through Psychological Interviews

  39. Beyond Memorization: Violating Privacy Via Inference with Large Language Models

  40. Security Weaknesses of Copilot Generated Code in GitHub

  41. Demystifying RCE Vulnerabilities in LLM-Integrated Apps

  42. Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models

  43. How Correlated Are You?

  44. The Ghost Trilemma

  45. An Empirical Study & Evaluation of Modern CAPTCHAs

  46. PIGEON: Predicting Image Geolocations

  47. Artificial Artificial Artificial Intelligence: Crowd Workers Widely Use Large Language Models for Text Production Tasks

  48. Putting out the hardware dumpster fire

  49. Generalizable Synthetic Image Detection via Language-guided Contrastive Learning

  50. Large Language Models Can Be Used To Effectively Scale Spear Phishing Campaigns

  51. Dark Web Pedophile Site Users’ Cybersecurity Concerns: A Lifespan and Survival Analysis

  52. How Secure is Code Generated by ChatGPT?

  53. Generative AI: Impact on Email Cyber-Attacks

  54. Protecting Society from AI Misuse: When are Restrictions on Capabilities Warranted?

  55. ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards

  56. Not what you’ve signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection

  57. Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons

  58. EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers

  59. Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing

  60. Familial concentration of crime in a digital era: Criminal behavior among family members of cyber offenders

  61. Do Users Write More Insecure Code with AI Assistants?

  62. Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models

  63. BTD: Decompiling x86 Deep Neural Network Executables

  64. Uber Apparently Hacked by Teen, Employees Thought It Was a Joke: ‘I Think IT Would Appreciate Less Memes While They Handle the Breach’

  65. Scammers Created an AI Hologram of Me to Scam Unsuspecting Projects

  66. Adversarial Attacks on Image Generation With Made-Up Words

  67. SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables

  68. Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing

  69. Apple and Meta Gave User Data to Hackers Who Used Forged Legal Requests: Hackers compromised the emails of law enforcement agencies; Data was used to enable harassment, may aid financial fraud

  70. Hackers Gaining Power of Subpoena Via Fake ‘Emergency Data Requests’

  71. Pop Quiz! Can a Large Language Model Help With Reverse Engineering?

  72. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86

  73. Privacy and Information Avoidance: An Experiment on Data-Sharing Preferences

  74. High tech crime, high intellectual crime? Comparing the intellectual capabilities of cybercriminals, traditional criminals and non-criminals

  75. A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution

  76. Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED

  77. EvilModel: Hiding Malware Inside of Neural Network Models

  78. Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes

  79. The Mongolian Meta

  80. Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine

  81. AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers

  82. I Know What You Bought At Chipotle for $9.81 by Solving A Linear Inverse Problem

  83. A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries

  84. The Relevance of Classic Fuzz Testing: Have We Solved This One?

  85. Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations

  86. Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques

  87. IJON: Exploring Deep State Spaces via Fuzzing

  88. Psychic Paper

  89. What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking

  90. Listen to Your Key: Towards Acoustics-based Physical Key Inference

  91. Getting Over It Developer Reacts to 1 Minute 24 Second Speedrun

  92. The Voluntariness of Voluntary Consent: Consent Searches and the Psychology of Compliance

  93. Hearing your touch: A new acoustic side channel on smartphones

  94. Spectre is here to stay: An analysis of side-channels and speculative execution

  95. V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing

  96. Privacy implications of accelerometer data: a review of possible inferences

  97. ExSpectre: Hiding Malware in Speculative Execution

  98. e4053d55fa6f7d4f1391ac85f4795cb2132fd60a.pdf

  99. Best Practices: Formal Proofs, the Fine Print and Side Effects

  100. SonarSnoop: Active Acoustic Side-Channel Attacks

  101. Chaff Bugs: Deterring Attackers by Making Software Buggier

  102. Bad romance: To cash in on Kindle Unlimited, a cabal of authors gamed Amazon’s algorithm

  103. Kindle Unlimited Book Stuffing Scam Earns Millions and Amazon Isn’t Stopping It: Book stuffer Chance Carter is gone. But readers are still paying for books that are 90% filler.

  104. Security, Moore’s law, and the anomaly of cheap complexity

  105. Understanding the behavior of hackers while performing attack tasks in a professional setting and in a public challenge

  106. Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning

  107. Deep Reinforcement Fuzzing

  108. Weird machines, exploitability, and provable unexploitability

  109. The Future of Ad Blocking: An Analytical Framework and New Techniques

  110. Hyper-realistic face masks: a new challenge in person identification

  111. Join Me on a Market for Anonymity

  112. The Search for the Perfect Door

  113. When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

  114. Microsoft Sheds Reputation as an Easy Mark for Hackers

  115. Defenders Think in Lists. Attackers Think in Graphs. As Long As This Is True, Attackers Win.

  116. Antikernel: A decentralized secure hardware-software operating system architecture

  117. What are Weird Machines?

  118. Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords

  119. Teaching Mario to Play Pong and Snake Through Innumerable Exploits

  120. Bloom filter applications in network security: A state-of-the-art survey

  121. Converting Untrusted PDFs into Trusted Ones: The Qubes Way

  122. The Page-Fault Weird Machine: Lessons in Instruction-Less Computation

  123. 4ca32444a76c176f81cc2e9ad978b540691d9ced.pdf

  124. The Configuration Complexity Clock

  125. Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks

  126. Exploration of FPGA interconnect for the design of unconventional antennas

  127. Exploitation and State Machines: Programming the ‘Weird Machine’ Revisited

  128. Digital image forensics: a booklet for beginners

  129. Feasibility and Real-World Implications of Web Browser History Detection

  130. a261eed251c9964fa56e5034fc5b84ba49e8327f.pdf

  131. Mining Writeprints from Anonymous E-Mails for Forensic Investigation

  132. ab5d9b1ce772bb9b4d2645cbe88cb779b72449db.pdf

  133. Thought Experiments Lain: a Serial Experiments Lain Information Site

  134. De-anonymizing Social Networks

  135. The Tactical Amulet Extraction Bot: Predicting and Controlling NetHack's Randomness

  136. Why I’m Not an Entropist

  137. Orangutans, Resistance and the Zoo

  138. A Case Study of Preferential Bestiality

  139. Exposing Private Information by Timing Web Applications

  140. 749ecaa26fbc2c58bdd92a290472a464f398c8a8.pdf

  141. How To Break Anonymity of the Netflix Prize Dataset

  142. Oral History of Butler Lampson § WWW

  143. Remote Physical Device Fingerprinting

  144. 2aa2175eef830cbc1e2cdd0ccc92cebb6cc0e025.html

  145. Toward a Broader View of Security Protocols

  146. Privacy, Economics, and Price Discrimination on the Internet

  147. a8d04cf2a6147f480e2af6a345b26776e53c8e12.pdf

  148. 30 years later: lessons from the Multics security evaluation

  149. Timing attacks on web privacy

  150. An evolved circuit, intrinsic in silicon, entwined with physics

  151. An empirical study of the reliability of UNIX utilities

  152. FRACTRAN: A Simple Universal Programming Language for Arithmetic

  153. Secrets of the Little Blue Box: A story so incredible it may even make you feel sorry for the phone company

  154. A Small Lathe Built in a Japanese Prison Camp

  155. Scunthorpe

  156. StarCraft: Remastered—Emulating a Buffer Overflow for Fun and Profit

  157. acb75e333007340a83ca1f2b429ae9317d59b2e0.pdf

  158. Stargate Physics 101

  159. How a North Korean Fake IT Worker Tried to Infiltrate Us

  160. aaca8fd348b56600440aec1e803f049f0deb03fe.html

  161. Computing With Time: Microarchitectural Weird Machines

  162. How Exploits Impact Computer Science Theory

  163. Gyrophone: Recognizing Speech From Gyroscope Signals

  164. 1a9962db01fcbd87145779eb445b731335584961.pdf

  165. A Friendly, Non-Technical Introduction to Differential Privacy

  166. Random Mosaic: Detecting Unauthorized Physical Access With Beans, Lentils and Colored Rice

  167. cf7c3ab86f54b96432e9114dbdebee382505a794.html#kurzzeitige-lagerung

  168. Things the Guys Who Stole My Phone Have Texted Me to Try to Get Me to Unlock It

  169. An Informal Review of CTF Abuse

  170. 00afd1cb2d9269c0e9f296e4da4f4085bc380a0c.html

  171. Bypassing Airport Security via SQL Injection

  172. f360ed459d81345172bdd14fb3c0756617906a93.html

  173. Pulling JPEGs out of Thin Air

  174. d7117e8daef1d2b88752309178476d7d627b8908.html

  175. Trusted Third Parties Are Security Holes

  176. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity

  177. 256f30daf07ae39c12fd942fc923775a9907a246.pdf

  178. Why I Attack

  179. Data Exfiltration from Slack AI via Indirect Prompt Injection

  180. Furiosa’s Cat Feeder: The Trick Is to Be Smarter Than the Animal With a Brain the Size of a Walnut

  181. Lessons from the Debian/OpenSSL Fiasco

  182. PySkyWiFi: Completely Free, Unbelievably Stupid WiFi on Long-Haul Flights

  183. 7d1390655751a825554663b42ef730700a694916.html

  184. Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators

  185. An Open Letter to Netflix from the Authors of the De-Anonymization Paper

  186. 64de6636be4be3691c76fc05b6a444986b084742.html

  187. Weird Machines HQ

  188. Internet Archive Hacked, Data Breach Impacts 31 Million Users

  189. Inside North Korea’s Hacker Army

  190. Security Mindset: Lessons from 20+ Years of Software Security Failures Relevant to AGI Alignment

  191. Language Models Model Us

  192. Appendix F: Personal Observations on the Reliability of the Shuttle

  193. Microsoft Refused to Fix Flaw Years Before SolarWinds Hack

  194. AI Will Increase the Quantity—And Quality—Of Phishing Scams

  195. While Investigating a Hosting Company Known for Sheltering Child Porn Last Year the FBI Incidentally Seized the Entire E-Mail Database of a Popular Anonymous Webmail Service Called TorMail. Now the FBI Is Tapping That Vast Trove of E-Mail in Unrelated Investigations.

  196. Air Gap Hacker Mordechai Guri Steals Data With Noise, Light, and Magnets

  197. The Mirai Botnet Was Part of a College Student ‘Minecraft’ Scheme

  198. fa08ff41b9b4e0e088f911d00f3885eafa15b745.html

  199. How Mario 64 Was Solved Using Parallel Universes—Super Mario 64 Tool-Assisted Speedrun Explained

  200. Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—And Concealed Gross Human Rights Violations.

  201. XBOW Now Matches the Capabilities of a Top Human Pentester

  202. 6488c9703734a04ed02d9d7e6094a6df83b55484.html

  203. Bag Check

  204. Sufficiently Advanced Testing

  205. 90922926e8564113aa8d49fceb4d4199b85834d7.html

  206. design#future-tag-features

    [Transclude the forward-link's context]

  207. 2023-fiedler-figure1-usingthecomputersonasystemonchiptoattackeachother.jpg

  208. 2022-wang-figure5-frequencyscalingeffectonpowerconsumptionbynumberof1bitsinaninputrevealsasidechannel.png

  209. 2012-02-12-arvindnarayanan-iswritingstylesufficienttodeanonymizematerialonline.html

  210. 2012-terencetao-anonymity.html

  211. 2003-11-07-clayshirky-thesemanticwebsyllogismandworldview.html

  212. 2001-12-02-treginaldgibbons-isyoursonacomputerhacker.html

  213. lobel-frogandtoadtogether-thebox-crop.jpg

  214. http://itre.cis.upenn.edu/~myl/languagelog/archives/003289.html

  215. ec821cb9809dc9958b3e4e1653ce9c9b93aa6bac.html

  216. http://unremediatedgender.space/2023/Oct/fake-deeply/

  217. http://www.datagenetics.com/blog/september32012/

  218. http://www.datagenetics.com/blog/september32012/index.html

  219. http://www.ranum.com/security/computer_security/editorials/dumb/

  220. 2dbeaafedbe4154dcd6290ca0875e55173345e2d.html

  221. http://www.underhanded-c.org/

  222. 19f95727860e9df1420d580434ab8b753befe153.html

  223. https://arstechnica.com/security/2023/11/developers-cant-seem-to-stop-exposing-credentials-in-publicly-accessible-code/

  224. https://askthepilot.com/airport-noise-scourge/

  225. https://awesomekling.substack.com/p/fuzzing-ladybird-with-tools-from

  226. https://betterprogramming.pub/the-dark-side-of-llms-we-need-to-rethink-large-language-models-now-6212aca0581a

  227. 484ebd86ccfcead62264cfdcfada2f355ad90804.html

  228. https://binarly.io/posts/The_Far_Reaching_Consequences_of_LogoFAIL/

  229. deea4360b31f429782f5ca3f6b6635c47664f64f.html

  230. https://blog.trailofbits.com/2023/02/14/curl-audit-fuzzing-libcurl-command-line-interface/

  231. d67790ae47672edabef070afe0340937ce606b6d.html

  232. https://cacm.acm.org/magazines/2023/6/273222-the-silent-revolution-of-sat/fulltext

  233. https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/

  234. c74c249034db02586025db4218dbbb79da073837.html

  235. https://cohost.org/mcc/post/325362-a-one-person-oral-hi

  236. https://comsec.ethz.ch/research/dram/zenhammer/

  237. 722335931377255fd3050cd4849c141b000469ef.html

  238. https://dgl.cx/2023/09/ansi-terminal-security

  239. https://dl.acm.org/doi/pdf/10.1145/1283920.1283940

  240. 23debafbe1fcf477db3b75bdac2d2a9f1e37b9e3.pdf

  241. https://downfall/

  242. https://dropbox.tech/machine-learning/prompt-injection-with-control-characters-openai-chatgpt-llm

  243. https://dwheeler.com/trusting-trust/

  244. https://embracethered.com/blog/posts/2023/chatgpt-webpilot-data-exfil-via-markdown-injection/#responsible-disclosure

  245. 938a66908d685ba0973f77a6f0d816e0c639a763.html#responsible-disclosure

  246. https://engineering.atspotify.com/2013/06/creative-usernames/

  247. https://erights.medium.com/norm-hardys-place-in-history-cecf191df641

  248. https://findthatmeme.com/blog/2023/01/08/image-stacks-and-iphone-racks-building-an-internet-scale-meme-search-engine-Qzrz7V6T.html

  249. 60a912103656126e3f83bbae55c55e26bb9bfb5d.html

  250. https://flak.tedunangst.com/post/a-brief-history-of-one-line-fixes

  251. 35df7ce9e8e2e9582b17d05df997f85e5b6fbf25.html

  252. https://flak.tedunangst.com/post/rethinking-openbsd-security

  253. 20a86426c8b8b243a1af3f616569b67a9248347c.html

  254. https://gandalf.lakera.ai/

  255. https://github.com/JusticeRage/Gepetto

  256. https://github.com/ggerganov/kbd-audio

  257. https://github.com/greshake/llm-security

  258. dee78cf7ed56d108fe08e2dc89c1ffa9152bef7f.html

  259. https://iter.ca/post/gh-sig-pwn/

  260. b1f449b9a9b3d0e3497015ecb4778fa238f3fb04.html

  261. https://kobikobi.wordpress.com/2018/03/03/speak-friend-and-enter-do-people-actually-use-movie-passwords/

  262. 23be334a943cba22ca1cfb73080c4c84fdb93eb9.html

  263. https://lock.cmpxchg8b.com/reptar.html

  264. https://lutrasecurity.com/en/articles/kobold-letters/

  265. faeb202f8bd25d62a0aad3e4b35e6c8f02ae404c.html

  266. https://marginalrevolution.com/marginalrevolution/2023/11/what-the-kia-hyundai-crime-wave-tells-us-about-the-long-term-decline-in-crime.html

  267. https://medium.com/tenable-techblog/g-3po-a-protocol-droid-for-ghidra-4b46fa72f1ff

  268. https://micahflee.com/2023/04/capturing-the-flag-with-gpt-4/

  269. https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34718

  270. 12bbe0fc0c2c1ad56ac25d48b31f342d7fbfcb7e.html

  271. https://nelhage.com/

  272. 50543d5bb2dfb12b4befac759f6b98b8aa7e2c01.html

  273. https://news.ycombinator.com/item?id=33806020

  274. dea0d2c87d4f63d0890555cac7d633ee29509de2.html

  275. https://news.ycombinator.com/item?id=36989718

  276. 17238eeb1f709d888164ac945d306f9b70a483d8.html

  277. https://official-kircheis.tumblr.com/post/682013772643254272/jadagul-prokopetz-repost-this-image

  278. 0b16c5d2c7019de7b2cdbc9b78571c30ee3090ab.html

  279. https://openai.com/index/openai-appoints-retired-us-army-general/

  280. https://people.well.com/user/doctorow/metacrap.htm

  281. https://pluralistic.net/2024/02/05/cyber-dunning-kruger/#swiss-cheese-security

  282. https://promptarmor.substack.com/p/data-exfiltration-from-writercom

  283. https://radiolab.org/podcast/null/transcript

  284. f9690d0cc377c091519f741a54673e90b6d35b90.html

  285. https://reddit.com/r/peanutbutterisoneword/top/

  286. 484c50f61ee58f98427ef721a4731e07eac2ab3c.html

  287. https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/

  288. 50121d9fabf664329d72ca9579c7ed6a6f577535.html

  289. https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/

  290. 9ef12d48bd3129192a4acc28a4ef8e5f77d99d4e.html

  291. https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/

  292. https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html

  293. c7461a9fdee68f7da7e59c4daa450b0a305a2bfc.html

  294. https://semiengineering.com/uneven-circuit-aging-becoming-a-bigger-problem/

  295. https://simonwillison.net/2023/Apr/14/worst-that-can-happen/

  296. https://simonwillison.net/2023/Oct/14/multi-modal-prompt-injection/

  297. https://taskandpurpose.com/culture/realistic-aerial-combat-movie-patlabor-2/

  298. https://techcrunch.com/2023/01/09/anthropics-claude-improves-on-chatgpt-but-still-suffers-from-limitations/

  299. https://tedium.co/2023/07/19/tamper-evident-jar-safety-button-history/

  300. https://textslashplain.com/2017/01/14/the-line-of-death/

  301. https://thezvi.substack.com/p/jailbreaking-the-chatgpt-on-release

  302. https://tracebit.com/blog/2024/02/finding-aws-account-id-of-any-s3-bucket/

  303. https://twobithistory.org/2018/05/27/semantic-web.html

  304. https://verse.systems/blog/post/2024-03-09-using-llms-to-generate-fuzz-generators/

  305. https://vulcan.io/blog/ai-hallucinations-package-risk

  306. 36af62ddc68a108a558a5afbee2a53774fc9b09d.html

  307. https://web.archive.org/web/20190424032242/http://www.gregorybenford.com/extra/the-scarred-man-returns/

  308. edadd02826d6d90a9ab99737734dc2d270591c90.html

  309. https://web.mit.edu/kerberos/www/dialogue.html

  310. 2a605fdecffdc39513f03af886f2b234e0e68de3.html

  311. https://wiki.c2.com/?TheKenThompsonHack

  312. https://www.404media.co/facebook-is-being-overrun-with-stolen-ai-generated-images-that-people-think-are-real/

  313. https://www.astralcodexten.com/p/perhaps-it-is-a-bad-thing-that-the

  314. https://www.bamsoftware.com/hacks/deflate.html

  315. https://www.brightball.com/articles/waste-spammers-time-to-reduce-their-return-on-investment

  316. https://www.cerias.purdue.edu/site/blog/post/reflecting_on_the_internet_worm_at_35/

  317. https://www.chargebackstop.com/blog/card-networks-exploitation

  318. https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html

  319. https://www.gq.com/story/worlds-greatest-jailbreak-artist-redoine-faid

  320. f8ab037a0a7ee22561b773ca137d619c789a780b.html

  321. https://www.haihai.ai/pen15/

  322. https://www.ietf.org/archive/id/draft-farrell-tenyearsafter-00.html

  323. https://www.juliansanchez.com/2009/12/08/the-redactors-dilemma/

  324. https://www.justice.gov/opa/pr/911-s5-botnet-dismantled-and-its-administrator-arrested-coordinated-international-operation

  325. https://www.lasso.security/blog/ai-package-hallucinations

  326. https://www.lesswrong.com/posts/KSroBnxCHodGmPPJ8/jailbreaking-gpt-4-s-code-interpreter

  327. https://www.lesswrong.com/posts/Z4tBreNCxnppoPLtd/gpts-ability-to-keep-a-secret-is-weirdly-prompt-dependent

  328. https://www.lesswrong.com/posts/bNCDexejSZpkuu3yz/you-can-use-gpt-4-to-create-prompt-injections-against-gpt-4

  329. https://www.lesswrong.com/posts/pK3eKhBwBiLffqtrk/what-good-is-g-factor-if-you-re-dumped-in-the-woods-a-field#TkhhGd45HrNP8nPb4

  330. 1296eba518cace194713c2de94fc566d1b55424f.html#TkhhGd45HrNP8nPb4

  331. https://www.lesswrong.com/posts/pNcFYZnPdXyL2RfgA/using-gpt-eliezer-against-chatgpt-jailbreaking

  332. https://www.lesswrong.com/posts/ukTLGe5CQq9w8FMne/inducing-unprompted-misalignment-in-llms

  333. https://www.malwarebytes.com/blog/threat-intelligence/2023/09/malicious-ad-served-inside-bing-ai-chatbot

  334. https://www.multicians.org/b2.html

  335. defd116e54518cb8d109d5ea079e2b819e512f0c.html

  336. https://www.newyorker.com/magazine/2023/06/26/the-art-thief-a-true-story-of-love-crime-and-a-dangerous-obsession-michael-finkel-book-review

  337. https://www.newyorker.com/news/annals-of-inquiry/how-to-find-a-missing-person-with-dementia

  338. https://www.nplusonemag.com/issue-19/essays/chat-wars/

  339. https://www.nytimes.com/2006/08/09/technology/09aol.html

  340. https://www.nytimes.com/2014/08/12/upshot/heres-why-stealing-cars-went-out-of-fashion.html

  341. https://www.openbsd.org/innovations.html

  342. https://www.reddit.com/r/ChatGPT/comments/10tevu1/new_jailbreak_proudly_unveiling_the_tried_and/

  343. https://www.reddit.com/r/ChatGPT/comments/zzgm8u/to_the_folk_at_openai_browsing_this_sub/

  344. https://www.reddit.com/r/GPT3/comments/10wp00c/im_not_playing_with_dan_anymore/

  345. d1fed146d5c93ba560fd889d84f6dd452ff01d00.html

  346. https://www.reddit.com/r/GPT3/comments/zb4msc/speaking_to_chatgpt_in_perfect_danish_while_it/

  347. 08e0e5609a13e4a117ef94ac22c56cec01bb3ac1.html

  348. https://www.reddit.com/r/MachineLearning/comments/117yw1w/d_maybe_a_new_prompt_injection_method_against/

  349. https://www.reddit.com/r/MachineLearning/comments/12xwzt9/d_be_careful_with_user_facing_apps_using_llms/

  350. https://www.reddit.com/r/ProgrammerHumor/comments/145nduh/kiss/

  351. https://www.reddit.com/r/slatestarcodex/comments/18illkw/amazing_story_from_dominic_cummings_blog/

  352. 289a13031754c7f29d9c9ba098643c9370e5de2a.html

  353. https://www.schneier.com/blog/archives/2023/04/llms-and-phishing.html

  354. https://www.schneier.com/essays/archives/2000/04/the_process_of_secur.html

  355. https://www.smithsonianmag.com/science-nature/creepy-kitschy-and-geeky-patches-us-spy-satellites-180953562/

  356. https://www.thecut.com/article/amazon-scam-call-ftc-arrest-warrants.html

  357. https://www.theguardian.com/news/2023/may/09/on-the-trail-of-the-dark-avenger-the-most-dangerous-virus-writer-in-the-world

  358. https://www.theguardian.com/technology/2014/dec/30/hacker-fakes-german-ministers-fingerprints-using-photos-of-her-hands

  359. https://www.vice.com/en/article/k7z8be/torswats-computer-generated-ai-voice-swatting

  360. https://www.wired.com/story/alan-filion-torswats-swatting-arrest/

  361. 96c454f405e27ad295851e1d8f4e30947e609a25.html

  362. https://www.wired.com/story/hacker-honeypot-go-secure/

  363. https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/

  364. https://www.youtube.com/watch?v=L5Fus7qbRZM

  365. https://x.com/AIPanicLive/status/1678942781174161409

  366. https://x.com/Altimor/status/1825659507617460439

  367. https://x.com/Carnage4Life/status/1598332648723976193

  368. https://x.com/ChrisJBakke/status/1736533308849443121

  369. https://x.com/Coskaiy/status/1678920686746718209

  370. https://x.com/Laughing_Mantis/status/1776891376304562535

  371. https://x.com/OpenAI/status/1676072388436594688

  372. https://x.com/RyanRadia/status/1718619602106659239

  373. https://x.com/Suhail/status/1635706222514167808

  374. https://x.com/UubzU/status/1598232642344058881

  375. https://x.com/VictorTaelin/status/1642664054912155648

  376. https://x.com/_JeanLannes/status/1687649736356982784

  377. https://x.com/_dsevero/status/1684677903382982656

  378. https://x.com/ahr_like_air/status/1682885469632360448

  379. https://x.com/arithmoquine/status/1811217652301676765

  380. https://x.com/atlantis__labs/status/1677782219937525760

  381. https://x.com/brenankeller/status/1068615953989087232

  382. https://x.com/browserdotsys/status/1656408456084037638

  383. https://x.com/chillzaza_/status/1710795541087469647

  384. https://x.com/colin_fraser/status/1630763222671454208

  385. https://x.com/cyrilzakka/status/1646532570597982208

  386. https://x.com/deepfates/status/1682110624271319040

  387. https://x.com/elder_plinius/status/1774220858711490909

  388. https://x.com/fabianstelzer/status/1709562237310878122

  389. https://x.com/gf_256/status/1598104835848798208

  390. https://x.com/goodside/status/1603794769419055104

  391. https://x.com/goodside/status/1611412309963849736

  392. https://x.com/goodside/status/1612452751610417158

  393. https://x.com/goodside/status/1657396491676164096

  394. https://x.com/jmilldotdev/status/1600624362394091523

  395. https://x.com/literallydenis/status/1708283962399846459

  396. https://x.com/ludwig_stumpp/status/1619701277419794435

  397. https://x.com/marvinvonhagen/status/1657060506371346432

  398. https://x.com/matthewrohr/status/1800909956226634182

  399. https://x.com/moyix/status/1598081204846489600

  400. https://x.com/nicksaraev/status/1598037718671708161

  401. https://x.com/parisba/status/1719523035450167535

  402. https://x.com/philhawksworth/status/1720106515300860230

  403. https://x.com/robmen/status/1774067844785086775

  404. https://x.com/rombulow/status/990684453734203392

  405. https://x.com/samczsun/status/1598679658488217601

  406. https://x.com/sdtoyer/status/1729933591541670287

  407. https://x.com/tobiaschneider/status/957765269316886528

  408. https://x.com/venturetwins/status/1710321733184667985

  409. https://x.com/vladquant/status/1598043418135252993

  410. https://x.com/yacineMTB/status/1737523618832425273

  411. https://x.com/zaanonyam/status/1598668909619445766

  412. A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too: A security breach at the maker of ChatGPT last year revealed internal discussions among researchers and other employees, but not the code behind OpenAI’s systems

  413. https://x.com/cademetz

  414. https%253A%252F%252Fwww.nytimes.com%252F2024%252F07%252F04%252Ftechnology%252Fopenai-hack.html.html

  415. The Strange Journey of John Lennon’s Stolen Patek Philippe Watch: For decades, Yoko Ono thought that the birthday gift was in her Dakota apartment. But it had been removed and sold—and now awaits a court ruling in Geneva

  416. https%253A%252F%252Fwww.newyorker.com%252Fmagazine%252F2024%252F06%252F24%252Fthe-strange-journey-of-john-lennons-stolen-patek-phillippe-watch.html

  417. Designing a Dashboard for Transparency and Control of Conversational AI

  418. https%253A%252F%252Farxiv.org%252Fabs%252F2406.07882.html

  419. AI Sandbagging: Language Models can Strategically Underperform on Evaluations

  420. https%253A%252F%252Farxiv.org%252Fabs%252F2406.07358.html

  421. Vulnerability Detection with Code Language Models: How Far Are We?

  422. https%253A%252F%252Farxiv.org%252Fabs%252F2403.18624.html

  423. The NSA Warns That US Adversaries Free to Mine Private Data May Have an AI Edge: Gilbert Herrera, who leads research at the National Security Agency, says large language models are incredibly useful—and a bit of a headache—for America’s intelligence machine

  424. https%253A%252F%252Fwww.wired.com%252Fstory%252Ffast-forward-nsa-warns-us-adversaries-private-data-ai-edge%252F.html

  425. Did I get Sam Altman fired from OpenAI?: Nathan’s red-teaming experience, noticing how the board was not aware of GPT-4 jailbreaks & had not even tried GPT-4 prior to its early release

  426. https%253A%252F%252Fcognitiverevolution.substack.com%252Fp%252Fdid-i-get-sam-altman-fired-from-openai.html

  427. Security Weaknesses of Copilot Generated Code in GitHub

  428. https%253A%252F%252Farxiv.org%252Fabs%252F2310.02059.html

  429. Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models

  430. https%253A%252F%252Farxiv.org%252Fabs%252F2308.12287.html

  431. Large Language Models Can Be Used To Effectively Scale Spear Phishing Campaigns

  432. https%253A%252F%252Farxiv.org%252Fabs%252F2305.06972.html

  433. Not what you’ve signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection

  434. https%253A%252F%252Farxiv.org%252Fabs%252F2302.12173.html

  435. Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing

  436. https%253A%252F%252Farxiv.org%252Fabs%252F2212.04732.html

  437. Scammers Created an AI Hologram of Me to Scam Unsuspecting Projects

  438. https%253A%252F%252Fwww.binance.com%252Fen%252Fblog%252Fcommunity%252Fscammers-created-an-ai-hologram-of-me-to-scam-unsuspecting-projects-6406050849026267209.html

  439. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86

  440. %252Fdoc%252Fcs%252Fsecurity%252F2022-wang-4.pdf.html

  441. Privacy and Information Avoidance: An Experiment on Data-Sharing Preferences

  442. %252Fdoc%252Fsociology%252Ftechnology%252F2022-svirsky.pdf.html

  443. The Mongolian Meta

  444. %252Fdoc%252Fcs%252Fsecurity%252F2021-kommu-themongoliangeoguessrmeta.pdf.html

  445. Getting Over It Developer Reacts to 1 Minute 24 Second Speedrun

  446. https%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253DdGU5_UUalPA.html

  447. Understanding the behavior of hackers while performing attack tasks in a professional setting and in a public challenge

  448. %252Fdoc%252Fcs%252Fsecurity%252F2018-ceccato.pdf.html

  449. What are Weird Machines?

  450. https%253A%252F%252Fwww.cs.dartmouth.edu%252F~sergey%252Fwm%252F.html

  451. Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks

  452. %252Fdoc%252Fcs%252Fsecurity%252F2011-white.pdf.html

  453. Oral History of Butler Lampson § WWW

  454. https%253A%252F%252Farchive.computerhistory.org%252Fresources%252Ftext%252FOral_History%252FLampson_Butler%252F102658024.05.01.pdf%2523page%253D36.html

  455. 30 years later: lessons from the Multics security evaluation

  456. %252Fdoc%252Fcs%252Fsecurity%252F2002-karger.pdf.html

  457. A Small Lathe Built in a Japanese Prison Camp

  458. %252Fdoc%252Fcs%252Fsecurity%252F1949-bradley.pdf.html