Feed cleverhans-blog [copy] http://www.cleverhans.io/feed.xml has loading error: cURL error 22: The requested URL returned error: 404
Feed Security (b)log [copy] http://securityblogru.livejournal.com/data/rss has loading error: cURL error 22: The requested URL returned error: 403 Forbidden
Feed [bodyawm] Богдан [copy] https://habr.com/ru/rss/users/bodyawm/articles/?fl=ru has loading error: cURL error 22: The requested URL returned error: 404
Bittensor price forecast as TAO hits $200 resistance amid Upbit listing

Bittensor price rose to highs of $207 amid Upbit’s listing announcement. However, buyers retreated and saw TAO touch lows of $179. The daily chart signals a potential bullish move, and $300 could be the next target.
Bittensor (TAO) has retested the $200 mark, reaching intraday highs of $207 in early trading on Monday as top cryptocurrencies look to hold key levels.
While the TAO price made gains in early trading, it has fluctuated heavily in the past hours, with the volatility coming amid a major exchange listing and broader market weakness.
Bittensor pares gains as Upbit lists TAO pairsAt the time of writing, TAO traded...
XRP price outlook as SBI CEO debunks $10B XRP holdings claim

XRP changed hands at around $1.50 as the broader market remains mostly bearish. SBI CEO Yoshitaka Kitao has said the firm does not hold $10 billion XRP, but a 9% stake in Ripple Labs. Can bulls reclaim $2 amid broader market resilience?
XRP price hovered near $1.47 in Asian trading hours on Monday, Feb.16, 2026, with the cryptocurrency down 8% in the past 24 hours.
The altcoin’s intraday performance came after comments from SBI Holdings CEO Yoshitaka Kitao, who recently clarified the firm’s investment in Ripple and the token XRP.
XRP and a $10 billion SBI holding rumourSBI, one of Ripple’s major partners, hit headlines...
SarahPeper at 18:54, 15 February 2026
← Older revision Revision as of 18:54, 15 February 2026 Line 13: Line 13:'''''' Status Update (2024-07-03): London hackspace is now open again to members!Status: London Hackspace is now open to members!
We're still not finished - major construction work is done for a while but there's plenty still to do building workbenches, unpacking equipment and cabling ACNodes. Ask around for ways you can help while you're in working on projects. We're still not finished - major construction work is done for a while, but there's plenty still to do, building workbenches, unpacking equipment and cabling ACNodes. Ask around for ways you can help while...
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak:
I’m speaking at Ontario Tech University in Oshawa, Ontario, Canada, at 2 PM ET on Thursday, February 26, 2026. I’m speaking at the Personal AI Summit in Los Angeles, California, USA, on Thursday, March 5, 2026. I’m speaking at Tech Live: Cybersecurity in New York City, USA, on Wednesday, March 11, 2026. I’m giving the Ross Anderson Lecture at the University of Cambridge’s Churchill College at 5:30 PM GMT on Thursday, March 19, 2026. I’m speaking at RSAC 2026 in San Francisco, California, USA, on Wednesday, March 25, 2026.The list is...
3D Printer Surveillance
New York is contemplating a bill that adds surveillance to 3D printers:
New York’s 20262027 executive budget bill (S.9005 / A.10005) includes language that should alarm every maker, educator, and small manufacturer in the state. Buried in Part C is a provision requiring all 3D printers sold or delivered in New York to include “blocking technology.” This is defined as software or firmware that scans every print file through a “firearms blueprint detection algorithm” and refuses to print anything it flags as a potential firearm or firearm component.
I get the policy goals here, but the solution just won’t work. It’s the...
Rewiring Democracy Ebook is on Sale
I just noticed that the ebook version of Rewiring Democracy is on sale for $5 on Amazon, Apple Books, Barnes & Noble, Books A Million, Google Play, Kobo, and presumably everywhere else in the US. I have no idea how long this will last.
Also, Amazon has a coupon that brings the hardcover price down to $20. You’ll see the discount at checkout.
Prompt Injection Via Road Signs
Interesting research: “CHAI: Command Hijacking Against Embodied AI.”
Abstract: Embodied Artificial Intelligence (AI) promises to handle edge cases in robotic vehicle systems where data is scarce by using common-sense reasoning grounded in perception and action to generalize beyond training distributions and adapt to novel real-world situations. These capabilities, however, also create new security risks. In this paper, we introduce CHAI (Command Hijacking against embodied AI), a new class of prompt-based attacks that exploit the multimodal language interpretation abilities of Large Visual-Language Models (LVLMs). CHAI embeds deceptive natural language instructions, such as misleading signs, in visual input, systematically searches the token space,...
AI-Generated Text and the Detection Arms Race
In 2023, the science fiction literary magazine Clarkesworld stopped accepting new submissions because so many were generated by artificial intelligence. Near as the editors could tell, many submitters pasted the magazine’s detailed story guidelines into an AI and sent in the results. And they weren’t alone. Other fiction magazines have also reported a high number of AI-generated submissions.
This is only one example of a ubiquitous trend. A legacy system relied on the difficulty of writing and cognition to limit volume. Generative AI overwhelms the system because the humans on the receiving end can’t keep up.
This is happening everywhere. Newspapers are...
LLMs are Getting a Lot Better and Faster at Finding and Exploiting Zero-Days
This is amazing:
Opus 4.6 is notably better at finding high-severity vulnerabilities than previous models and a sign of how quickly things are moving. Security teams have been automating vulnerability discovery for years, investing heavily in fuzzing infrastructure and custom harnesses to find bugs at scale. But what stood out in early testing is how quickly Opus 4.6 found vulnerabilities out of the box without task-specific tooling, custom scaffolding, or specialized prompting. Even more interesting is how it found them. Fuzzers work by throwing massive amounts of random inputs at code to see what breaks. Opus 4.6 reads and reasons about...