
Isaac Potoczny-Jones
@SyntaxPolice
Machine learning, #Encryption and #IAM, #Cybersecurity, #Privacy, #pdx, #Haskell, Cycling. Founder of @tozny. @[email protected]
내가 좋아할 만한 콘텐츠
Galois this week announced the release of Cryptol 3.0.0, Crux 0.7, and SAW 1.0. This significant update brings extensive overhauls and new features—an exciting leap forward for our core verification tools. galois.com/news/galois-re…

"It's rough because, for those who are still doing this, the load is increasing," Tozny understands, cyber professionals are busy! Our technology is designed to optimize security posture while minimizing the overhead it takes to run it. ow.ly/euK650NQZXp
😳
New: we proved it could be done. I used an AI replica of my voice to break into my bank account. The AI tricked the bank into thinking it was talking to me. Could access my balances, transactions, etc. Shatters the idea that voice biometrics are foolproof vice.com/en/article/dy7…
Models such as Stable Diffusion are trained on copyrighted, trademarked, private, and sensitive images. Yet, our new paper shows that diffusion models memorize images from their training data and emit them at generation time. Paper: arxiv.org/abs/2301.13188 👇[1/9]
![Eric_Wallace_'s tweet image. Models such as Stable Diffusion are trained on copyrighted, trademarked, private, and sensitive images.
Yet, our new paper shows that diffusion models memorize images from their training data and emit them at generation time.
Paper: arxiv.org/abs/2301.13188
👇[1/9]](https://pbs.twimg.com/media/Fnz3bW4aUAQsA5V.jpg)
"Given access to a synthetic dataset, a strategic adversary can infer, with high confidence, the presence of a target record in the original data." Synthetic data have a lot of value, so this study is concerning and disappointing to see. Though perhaps not surprising.
Synthetic Data Does Not Reliably Protect #Privacy, Researchers Claim buff.ly/3lS0gkC @UniteAi #BigData #AI #MachineLearning #DigitalHealth #CyberSecurity Cc @SpirosMargaris @ahier @hessiejones @roxananasoi @archonsec @Shirastweet @TriciaKicksSaaS

In our latest article, Galois research engineer Sourya Dey discusses DLKoopman, an open-source software tool developed by Galois to model and predict the behavior of complex systems, from aeronautics to quantum mechanics to medical science and beyond. galois.com/blog/2023/01/d…
galois.com
Harnessing Deep Learning to Model Complex Systems
Harnessing Deep Learning to Model Complex Systems
I got into a discussion with @OrinKerr the other day about the recent NYT op-ed on Signal and whether “metadata-resistant communications” is good or bad for policing and if it should be opposed. And I guess I wanted to talk about how those arguments should be approached. 1/
The Core Libraries Committee that governs the main Haskell libraries has openings: discourse.haskell.org/t/clc-election…
Portland Public Schools to hire first-ever Safe Routes to School leader - Move comes amid Safe Routes funding boost, bike bus movement in full steam, and city look to make good on goal of 25% of trips by bike by 2030 bikeportland.org/2022/12/20/por…
"One of the reasons why getting full access to your device is really tempting for governments is the same reason it’s tempting for abusive partners and former partners: we carry tracking devices in our pockets." - EFF Director of Cybersecurity @evacide ted.com/talks/eva_galp…
Cybersecurity year in review from @NSACyber: nsa.gov/Press-Room/Pre…
I think we’re about to see an explosion of new end-to-end encrypted cloud services. bleepingcomputer.com/news/security/…
As experts have long been pointing out: NFTs are a lie. The "thing" you think you are buying is just a URL. When the website goes down, your NFT points to nothing.
FTX-hosted NFTs break after website is redirected to a restructuring page December 7, 2022 web3isgoinggreat.com/?id=ftx-hosted…

Looks like Apple is rolling out opt-in end to end encryption for iCloud backups. apple.com/newsroom/2022/…
I can’t tell what’s going on internally, but it looks like Apple has gotten over these concerns sufficiently to (soon) enable full encryption for iCloud backups. This will require users to opt in, and it will include a “social backup” feature in case you lose your passcode. 6/
1. Signal (libaxolotl) uses GPL/AGPL. 2. Moxie goes on vacation. 3. Twitter abandons it’s encrypted DMs project. 4. Elon Musk can read your DMs.

A buddy who's interested in end-to-end encryption (E2EE) but hasn't done one of these projects in the very messy place which is the real world happened to ask me this morning about pitfalls which might not be obvious. So here's a partial list in the hopes that it's helpful. 🧵
Thrilled to be joining the @tozny board of directors! Thanks to Tom Sperry and Adam Stoll of Rogue Venture Partners, Rob Wiltbank of @galois , and Raj Srivathsa and the @tozny leadership team for asking me to be part of this awesome journey. #cybersecurity #endtoendsecurity
We are excited to welcome @jamil_n_jaffer to our Board of Directors! He will be helping guide Tozny’s portfolio of security products that will equip companies with the end-to-end security that the data-driven marketplace requires in the 21st century. tozny.com/blog/jamil-n-j…
United States 트렌드
- 1. Mike Evans 8,399 posts
- 2. #WWERaw 24.4K posts
- 3. Gibbs 13.9K posts
- 4. Tez Johnson 1,740 posts
- 5. Lions 64.1K posts
- 6. Bucs 15K posts
- 7. Dragon Lee 4,243 posts
- 8. White House 219K posts
- 9. Josh Naylor 2,790 posts
- 10. #OnePride 5,206 posts
- 11. Goff 7,215 posts
- 12. #TBvsDET 3,515 posts
- 13. Ben Solo 10.6K posts
- 14. Baker Mayfield 4,825 posts
- 15. Bron 19.2K posts
- 16. East Wing 42.5K posts
- 17. #RawOnNetflix N/A
- 18. FanDuel 23.6K posts
- 19. Bieber 16.2K posts
- 20. Game 7 53.8K posts
Something went wrong.
Something went wrong.