codepref

@codepref

codepref, un duo fort de quinze ans d’expérience en informatique.

Québec, Canada
Vrijeme pridruživanja: svibanj 2011.

Tweetovi

Blokirali ste korisnika/cu @codepref

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @codepref

  1. proslijedio/la je Tweet
    Odgovor korisniku/ci

    What's super cool about cut-rate USB sticks is that they're often a Frankenstein of parts on the inside. Buy two and pull them both apart, you might find different flash AND firmware controllers on each. You may even find one of them is just an SD card soldered to a USB board.

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Fun fact: That job screening company that scans Twitter accounts for bad words has developers that commit plaintext passwords on GitHub. ... Maybe they're scanning the wrong website.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    8. sij
    Poništi
  4. proslijedio/la je Tweet
    2. velj

    Code is a moving target and audits are never complete ... even though the initial audit bootstrap may be annoying for a large or complicated surface .. and you may come up empty that first pass, it pays dividends to your time to keep up with that surface continuously

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    If you drive down the road and see a car crash you are going to look. But the internet interprets that as if it is what people want. Social media algorithms exploit these same tendencies and promote social conflict because it increases engagement.

    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Interactive rebase is a common practice we should all be familiar with 🥰 but it can surely be confusing. ICYMI, I made a comic about it:

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    Out today, my Security Engineering book chapter 12 tells the story of the last decade's frauds against card payments and online banking, and how the defences have adapted:

    Poništi
  8. proslijedio/la je Tweet
    2. velj

    And here’s a wonderful post by OpenSMTPD’s main developer : Very interesting insight on how a bug enters the code and becomes exploitable over time.

    Poništi
  9. proslijedio/la je Tweet
    2. velj

    Data collection in ML often emphasizes size & efficiency, taking data in masses indiscriminately without critiquing its origin, motivation, platform, or potential impact.

    n. In practice, data collection in significant ML subfields
is done without following a rigorous procedure or set of guidelines.
While some subfields in ML have fine-grained approaches to data
collection, others such as NLP and CV emphasize size and efficiency.
This approach often encourages data collection to be indiscriminate
[28]. Taking data in masses without critiquing its origin, motivation,
platform, and poten
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    2. velj

    These quotes are from "Lessons from Archives: Strategies for Collecting Sociocultural Data in Machine Learning" by

    ABSTRACT
A growing body of work shows that many problems in fairness,
accountability, transparency, and ethics in machine learning systems are rooted in decisions surrounding the data collection and
annotation process. In spite of its fundamental nature however, data
collection remains an overlooked part of the machine learning (ML)
pipeline. In this paper, we argue that a new specialization should
be formed within M
    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    Our new research demonstrates that DMA attacks can compromise firmware (and OS) on enterprise laptops with hardware root of trust capabilities among the best in the industry. Very proud to work with the team here at

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    30. sij

    Written a while ago but still useful I hope, via : "IPv6-related Requirements for the Internet Uplink or MPLS Networks"

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    Say hello to OpenSK: a fully open-source security key implementation -

    Poništi
  15. proslijedio/la je Tweet
    27. sij

    Blink: Intent to Prototype: Curve25519 in Web Cryptography

    Poništi
  16. proslijedio/la je Tweet
    27. sij
    Poništi
  17. proslijedio/la je Tweet
    29. sij

    TLS ALPN and RSASSA-PSS security features to be added to OpenJDK 8.

    Poništi
  18. proslijedio/la je Tweet
    29. sij

    After our investigation Avast has published a blog post defending its sale of users’ browsing data, but adds it will “continue to consider how a trends analytics service aligns with our values as a cybersecurity and privacy company.”

    Poništi
  19. proslijedio/la je Tweet

    Wireguard is now in the mainline Linux kernel.

    Poništi
  20. proslijedio/la je Tweet
    28. sij

    The app lets you clear your history right up front, but if you want to disconnect future data, you have to tap 4 more times across multiple screens. Tap "More options", "Manage Future Activity", then "Manage Future Activity" again - then you can disable it. The journey: (4/5)

    The start of Facebook's Off-Facebook Activity screen.
    After tapping "More Options".
    After tapping "Manage Future Activity".
    After tapping "Manage Future Activity" again.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·