\newcommand{\femb0t}{ (@__femb0t) 's Twitter Profile
\newcommand{\femb0t}{

@__femb0t

✨ Privacy and Sécurité phd student (hiatus) (ノ◕ヮ◕)ノ*:・゚✨ Learning ✨Have many interests✨⋇⋆✦⋆⋇ ✨

ID: 1357813203019968516

calendar_today05-02-2021 22:07:54

57,57K Tweet

21,21K Followers

754 Following

MNT Research GmbH (@minut_e) 's Twitter Profile Photo

if you want to stay in the loop about our new Open Hardware laptop MNT Reform Next, the Crowd Supply prelaunch page is now online: crowdsupply.com/mnt/mnt-reform…

Linux Kernel Security (@linkersec) 's Twitter Profile Photo

Accidentally uncovering a seven years old vulnerability in the Linux kernel Article by Anderson Nascimento about finding and analyzing a slab use-after-free vulnerability in the TCP sockets implementation. allelesecurity.com/accidentally-u…

Accidentally uncovering a seven years old vulnerability in the Linux kernel

Article by <a href="/andersonc0d3/">Anderson Nascimento</a> about finding and analyzing a slab use-after-free vulnerability in the TCP sockets implementation.

allelesecurity.com/accidentally-u…
natalie (@natalie_thenerd) 's Twitter Profile Photo

Did you know I made a board scan wiki with all the scans I've made to date. These are excellent for fixing devices wiki.nataliethenerd.com

Did you know I made a board scan wiki with all the scans I've made to date. These are excellent for fixing devices wiki.nataliethenerd.com
h0mbre (@h0mbre_) 's Twitter Profile Photo

making a semantically equivalent frankenstein's monster out of your fuzzing target is most of the fun in fuzzing (outside of making the fuzzer itself)

Chhavi Yadav (@chhaviyadav_) 's Twitter Profile Photo

Want a 5-min break from RL?? Bringing to you my latest paper, to be presented at ICML Conference this July -- ‘ExpProof : Operationalizing Explanations for Confidential Models with ZKPs’ Explanations, though starting out as a debugging tool, are now proposed as a means to prove

Want a 5-min break from RL?? Bringing to you my latest paper,  to be presented at <a href="/icmlconf/">ICML Conference</a>  this July -- ‘ExpProof : Operationalizing Explanations for Confidential Models with ZKPs’

Explanations, though starting out as a debugging tool, are now proposed as a means to prove
Boris Larin (@oct0xor) 's Twitter Profile Photo

Really enjoyed TyphoonCon🌪️ keynote of Andy Andy Nguyen about his journey of hacking gaming consoles. One of the best and most inspiring talks on bug hunting I have ever seen!

Really enjoyed <a href="/typhooncon/">TyphoonCon🌪️</a> keynote of Andy <a href="/theflow0/">Andy Nguyen</a> about his journey of hacking gaming consoles. One of the best and most inspiring talks on bug hunting I have ever seen!
Satnam Singh (@satnam6502) 's Twitter Profile Photo

Vibe coding with Erik Meijer using LLMs to generate circuits specified and formally verified in Agda and Lean, LLM transliterated into SystemVerilog with corresponding UVM tests and SVA formal properties for model checking, as well as LLM generated FSM Mermaid diagrams. Took

Vibe coding with <a href="/headinthebox/">Erik Meijer</a> using LLMs to generate circuits specified and formally verified in Agda and Lean, LLM transliterated into SystemVerilog with corresponding UVM tests and SVA formal properties for model checking, as well as LLM generated FSM Mermaid diagrams. Took
Satnam Singh (@satnam6502) 's Twitter Profile Photo

A fabulous interview with the inspiring Andy Gordon where he makes a compelling case for developing software from natural language prompts, something he puts into practice at Cogna. An inspiring career spanning the Haskell bind operator; lambdas in Excel; to LLMs for no-code