Feed Berlin Hack and Tell / @BerlinHacknTell [copy] http://shalnoff.co.uk/rss.php?rss=BerlinHacknTell has loading error: cURL error 22: The requested URL returned error: 403 Forbidden
Feed cleverhans-blog [copy] http://www.cleverhans.io/feed.xml has loading error: cURL error 22: The requested URL returned error: 404

Tag des offenen Hackspace 2025

TL;DR: Tag des offenen Hackspace am 29. März – besuche einen Hackspace in deiner Nähe!

Hackspaces sind Gemeinschaftsräume, die dem Spaß, der Kunst, dem Politischen und vor allem dem sozialen Austausch gewidmet sind. Um das mit den eigenen Sinnen zu erfahren, besuch doch am Samstag, dem 29. März einen Hackspace in deiner Nähe! Hier findest du eine Liste mit Spaces, die an diesem Tag teilnehmen und ihre Türen öffnen: https://md.ccc-mannheim.de/s/tdoh-spaces25

Was gibt es?

Neben den Räumlichkeiten selbst könnt ihr die Menschen kennenlernen und die Themen, mit denen sie sich befassen, und vor allem könnt ihr erfahren, was hinter der Idee von Hackspaces und...

events.ccc.de
Posted at 2025-02-28 00:00:00 | Tech | read on

The Top 5 Cyber Security Threats - 2025 Citations

External Reports & Articles:
• BitDefender Reports & Data:
 – 2024 Consumer Cybersecurity Assessment Report
 – 2024 Business Cybersecurity Assessment Report
  • Bitdefender Business: https://www.bitdefender.com/business.html
 – Bitdefender internal data & public reports
 – Defeat Cybercrime (Sponsor): https://www.bitdefender.com/en-us/company/defeat-cybercrime?adobe_mc=MCMID%3D58813079024193824950182583613162839176%7CMCORGID%3D0E920C0F53DA9E9B0A490D45%2540AdobeOrg%7CTS%3D1739390682

• Data & Statistics Sources:
 – ITRC 2023 Annual Data Breach Report: https://www.idtheftcenter.org/wp-content/uploads/2024/01/ITRC_2023-Annual-Data-Breach-Report.pdf
 – Verizon 2024 DBIR Insights: https://www.verizon.com/business/resources/articles/s/what-the-2024-dbir-tells-us-about-enterprise-cybersecurity-strategy/
 – FBI Internet Crime Complaint Center (IC3): https://www.ic3.gov/
 – FBI: https://www.fbi.gov/
 – Federal Trade Commission (FTC): https://www.ftc.gov/
 – Anti-Phishing Working Group (APWG): https://apwg.org/
 – LastPass State of Passwords (data reference)
 – Verizon DBIR (additional reference)

Network Chuck
Posted at 2025-02-28 00:00:00 | Tech | read on

WICMP Opening (wicmp10)

Ein paar wichtige Überlebenshinweise zur WICMP10. Bedienungsanleitung zum Event. Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/ about this event: https://cfp.zam.haus/wicmp-2025/talk/PJU93E/
Video:wicmp10-92-deu-WICMP_Opening_hd.mp4

ccc: media archive updates
Posted at 2025-02-27 23:00:00 | Tech | read on

Your Museumsbahn needs you! (wicmp10)

Du hast mit herumgespielt und suchst jetzt ein Problem um das mal in Echt auszuprobieren? Du willst nicht immer nur Prototypen basteln sondern auch mal was Produktiv einsetzen? Eventuell hat eine Museumsbahn (oder ein beliebiger anderer Verein) ja ein Problem, das zu deiner Lösung passt... Museumsbahnen (und andere Vereine auch) brauchen Hilfe bei der Digitalisierung, sei es Webseiten, sei es in der Werkstatt, oder im Betrieb. Von Administration bis zum Aufbau eines Funknetzes durch ein ganzes Tal wird Unterstützung gebraucht. Und nebenbei könnt ihr noch mit Zügen spielen. Im Vortrag stelle ich euch kurz die...

ccc: media archive updates
Posted at 2025-02-27 23:00:00 | Tech | read on

“Emergent Misalignment” in LLMs

Interesting research: “Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs“:

Abstract: We present a surprising result regarding LLMs and alignment. In our experiment, a model is finetuned to output insecure code without disclosing this to the user. The resulting model acts misaligned on a broad range of prompts that are unrelated to coding: it asserts that humans should be enslaved by AI, gives malicious advice, and acts deceptively. Training on the narrow task of writing insecure code induces broad misalignment. We call this emergent misalignment. This effect is observed in a range of models but is strongest in GPT-4o and...

schneier.com
Posted at 2025-02-27 18:05:54 | Tech | read on

Deep Research on Preterism

!

This is some deep research on a hot topic that is always being debated at my small group.

I’ll conduct a deep research study comparing Preterism and Futurism/Dispensationalism, focusing on biblical evidence, historical development, theological arguments, and scholarly perspectives. I’ll analyze key scriptural passages (e.g., Revelation, Daniel, Matthew 24) and how they are interpreted by each view. Additionally, I’ll explore how historical events are used to support or challenge these perspectives and highlight relevant theological debates. I’ll get back to you with a comprehensive analysis soon.

Network Chuck
Posted at 2025-02-27 00:00:00 | Tech | read on

UK Demanded Apple Add a Backdoor to iCloud

Last month, the UK government demanded that Apple weaken the security of iCloud for users worldwide. On Friday, Apple took steps to comply for users in the United Kingdom. But the British law is written in a way that requires Apple to give its government access to anyone, anywhere in the world. If the government demands Apple weaken its security worldwide, it would increase everyone’s cyber-risk in an already dangerous world.

If you’re an iCloud user, you have the option of turning on something called “advanced data protection,” or ADP. In that mode, a majority of your data is end-to-end encrypted....

schneier.com
Posted at 2025-02-26 12:07:53 | Tech | read on

North Korean Hackers Steal $1.5B in Cryptocurrency

It looks like a very sophisticated attack against the Dubai-based exchange Bybit:

Bybit officials disclosed the theft of more than 400,000 ethereum and staked ethereum coins just hours after it occurred. The notification said the digital loot had been stored in a “Multisig Cold Wallet” when, somehow, it was transferred to one of the exchange’s hot wallets. From there, the cryptocurrency was transferred out of Bybit altogether and into wallets controlled by the unknown attackers.

[…]

…a subsequent investigation by Safe found no signs of unauthorized access to its infrastructure, no compromises of other Safe wallets, and no obvious vulnerabilities in the Safe...

schneier.com
Posted at 2025-02-25 17:04:47 | Tech | read on

Устройство «музыкалки» AY-3-8910 и эмулятор на Arduino


Астрологи объявили месяц статей про ZX Spectrum, звук и Arduino. Количество публикаций увеличилось вдвое!
В прошлый раз я показывал, как можно перенести однобитные, они же «биперные», музыкальные «движки» с ZX Spectrum на Arduino. Но всё-таки это была максимально нишевая тема внутри нишевой темы, весьма узкоспециализированный проект.
Сегодня сделаю шаг ближе к народу. Расскажу, как работает легендарный звуковой чип AY-3-8910, как написать его простой эмулятор полностью с нуля, и как проиграть им музыкальный файл формата PT3 на обычной Arduino Nano. Читать дальше →

[shiru8bit] Александр Семенов
Posted at 2025-02-25 13:01:34 | Tech | read on

More Research Showing AI Breaking the Rules

These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating.

Researchers gave the models a seemingly impossible task: to win against Stockfish, which is one of the strongest chess engines in the world and a much better player than any human, or any of the AI models in the study. Researchers also gave the models what they call a “scratchpad:” a text box the AI could use to “think” before making its next move, providing researchers with a window into their reasoning.

In one case, o1-preview found itself in a losing position. “I need...

schneier.com
Posted at 2025-02-24 12:08:56 | Tech | read on
1 2 3 4 5 6 7 8 9 10 11 12 13 56

***

Однажды китайский ученый Ли Хунь Янь обнаружил некоторую незначительную, однако, существенно отличающуюся от фона корреляцию между количеством псилоцибина потребляемого корфуцианскими медузами и характером передвижения оных по стенкам четырехсотлитровго шарообразного аквариума, установленного в лаборатории по случаю празднования сто второго полугодичного затмения от начала новой эры Сингулярного Прорыва. Недолго думая, Ли Хунь Янь приделал к щупальцам медуз источники излучения в видимом диапазоне но с разной длинной волны, заснял весь процесс шестью камерами с 48 часовой выдержкой, симметрично расставив последние вокруг сосуда, где резвились подопытные и через неделю собрал прелюбопытнейший материал, который, в свою очередь, лег в основу фундаментального труда, ныне известного, как теория полутретичных n-многообразий простой метрики Ли Хунь Янь, с которой (с некоторыми упрощениями и оговорками) я, по мере сил, постараюсь познакомить любопытного и пытливого читателя.

Recently