Ace Pace (@ace__pace) 's Twitter Profile
Ace Pace

@ace__pace

There is never enough time, thank you for yours.

ID: 2860857066

linkhttp://www.acepace.net calendar_today17-10-2014 17:57:42

2,2K Tweet

936 Takipçi

1,1K Takip Edilen

Vic 🌮 (@vicvijayakumar) 's Twitter Profile Photo

We used to ask candidates to build a particular stateful API from zero. You show up with your laptop and you’re given an empty folder, and can use the internet however necessary to accomplish it. (this is all pre-AI) Startup engineers owned it, FAANG devs struggled. The theory

Dino A. Dai Zovi (@dinodaizovi) 's Twitter Profile Photo

BinAuthz is a good design because it doesn't just trust human credentials to deploy whatever artifact they (or an attacker) want to, the trust and authorization is based on the provenance of the artifact from every reviewed and approved commit to reproducibly-built artifact.

Yaakov Katz (@yaakovkatz) 's Twitter Profile Photo

Something that has long baffled me is why Israeli politicians seem genuinely mystified that the world continues to embrace the two-state solution – and why even Trump, the president many once believed would green-light annexation, keeps returning to it as the only path forward.

BlueHat IL (@bluehatil) 's Twitter Profile Photo

BlueHat IL 2026 will rock - featuring some of the foremost voices in global cybersecurity. That part’s certain. The only question is whether you, too, will take the big stage. Submit your paper now: microsoftrnd.co.il/bluehatil/conf…

BlueHat IL 2026 will rock - featuring some of the foremost voices in global cybersecurity. That part’s certain. The only question is whether you, too, will take the big stage. Submit your paper now: microsoftrnd.co.il/bluehatil/conf…
HotCakeX ✡︎ סגול (@cybercakex) 's Twitter Profile Photo

After Months of Development, FINALLY ready to share: Harden System Security🎉 ✅ Complete System Hardening ✅ Security Posture Analysis ✅ All-in-One Toolkit ✅ Built-in Intune support for Scalability ✅ Beautiful Modern UI ✅ CLI support github.com/HotCakeX/Harde… #Cyber #Windows

Ace Pace (@ace__pace) 's Twitter Profile Photo

I'm not sure what I think of CTFs as evals (Cybench, Websec.fr and many others). This shows that even "hard" CTFs fall to AIs

Ace Pace (@ace__pace) 's Twitter Profile Photo

Since it's doing the rounds, I unpacked the Windows Start Menu react native package. I uploaded strings some metadata gist.github.com/acepace/e8e5dd… Yoav Alon No hint of React Server :)

Daniel Lemire (@lemire) 's Twitter Profile Photo

“We see something that works, and then we understand it.” (Thomas Dullien) It is a deeper insight than it seems. Young people spend years in school learning the reverse: understanding happens before progress. That is the linear theory of innovation. So Isaac Newton comes up

“We see something that works, and then we understand it.” (Thomas Dullien)

It is a deeper insight than it seems.

Young people spend years in school learning the reverse: understanding happens before progress. That is the linear theory of innovation.

So Isaac Newton comes up
Brian in Pittsburgh (@arekfurt) 's Twitter Profile Photo

"But where will the talent come from?" Are you kidding? There's no shortage of IT admins, developers, and pen testers whose existing skills & knowledge could, with some training, fairly quickly be turned to non-apex offensive cyber operations.

Zion Leonahenahe Basque (@mahal0z) 's Twitter Profile Photo

Do LLMs actually help hackers reverse engineer and understand the software they want to exploit? We ran the first fine-grained human study of LLMs + reverse engineering. To appear at NDSS 2026. Interested? Some quick findings in 🧵👇 Paper: zionbasque.com/files/papers/d…

Do LLMs actually help hackers reverse engineer and understand the software they want to exploit?

We ran the first fine-grained human study of LLMs + reverse engineering.
To appear at NDSS 2026.

Interested? Some quick findings in 🧵👇
Paper: zionbasque.com/files/papers/d…
Sakana AI (@sakanaailabs) 's Twitter Profile Photo

Introducing Digital Red Queen (DRQ): Adversarial Program Evolution in Core War with LLMs Blog: sakana.ai/drq Core War is a programming game where self-replicating assembly programs, called warriors, compete for control of a virtual machine. In this dynamic

Ace Pace (@ace__pace) 's Twitter Profile Photo

This is a very surprising result because (1) I thought it'd take more time (2) how minimal the harness is. This is also very impressive dataset work, super organized and reproducible Sean Heelan wow