[go: up one dir, main page]

27 Oct 25

Local LLMs prioritize privacy over security. Our research reveals a 95% backdoor injection success rate. If you’re running a local LLM for privacy and security, you need to read this

by tmfnk 3 months ago saved 2 times

Research project homepage for SATCOM Security: papers, source code, and recent satellite communications vulnerabilities. We pointed a commercial-off-the-shelf satellite dish at the sky and carried out the most comprehensive public study to date of geostationary satellite communication. A shockingly large amount of sensitive traffic is being broadcast unencrypted, including critical infrastructure, internal corporate and government communications, private citizens’ voice calls and SMS, and consumer Internet traffic from in-flight wifi and mobile networks. This data can be passively observed by anyone with a few hundred dollars of consumer-grade hardware. There are thousands of geostationary satellite transponders globally, and data from a single transponder may be visible from an area as large as 40% of the surface of the earth.

by tmfnk 3 months ago saved 2 times

24 Oct 25

A privacy-preserving home security camera that uses end-to-end encryption. (Secluso was previously named Privastead.) Secluso is a command-line tool designed for securely managing application secrets within various cloud computing environments.

by tmfnk 4 months ago

This weblog features the work of developer Simon Willison, primarily focusing on the latest developments in AI, large language models (LLMs), prompt injection vulnerabilities, coding agents, and related software and security topics.

by tmfnk 4 months ago saved 2 times

This 2016 33C3 talk by Karsten Nohl and Nemanja Nikodijevic explores the security vulnerabilities of outdated, 80s-era travel booking systems and demonstrates real-world hacking risks like tracking travelers and stealing flights.

by tmfnk 4 months ago saved 2 times

Digital Defense provides “The Ultimate Personal Security Checklist,” a comprehensive, categorized guide with actionable steps to help users secure their digital lives, protect their privacy, and improve their physical security.

by tmfnk 4 months ago