Andrey Labunets (@isciurus) 's Twitter Profile
Andrey Labunets

@isciurus

Security researcher, vector space reverse engineering

ID: 282495264

linkhttps://alabunets.com/ calendar_today15-04-2011 09:40:02

433 Tweet

1,1K Followers

478 Following

earlence (@earlencef) 's Twitter Profile Photo

We did an experimental security analysis of perceptual hashing systems when they are applied for content scanning. Two discoveries: (1) It is possible to conduct physical surveillance on high-value target individuals by manipulating the content database.

earlence (@earlencef) 's Twitter Profile Photo

Our group has two papers at NDSS. (1) Come see Ashish talk about our work on phy surveillance, CSAM and E2EE comms, Tuesday around 3.40 pm. (work with Andrey Labunets Tadayoshi (Yoshi) Kohno)

Andrey Labunets (@isciurus) 's Twitter Profile Photo

Maybe OpenAI could also reconsider a "non-disparagement" (nondisclosure) clause in their bug bounty rules at bugcrowd.com/openai?

Maybe OpenAI could also reconsider a "non-disparagement" (nondisclosure) clause in their bug bounty rules at bugcrowd.com/openai?
Andrey Labunets (@isciurus) 's Twitter Profile Photo

A great talk by Meredith Whittaker: "Feelings Are Facts: Love, Privacy, and the Politics of Intellectual Shame" media.ccc.de/v/38c3-feeling… Everyone, both in the security community and beyond, should attend these talks for many reasons. One of them is to calibrate our moral compass [1].

Andrey Labunets (@isciurus) 's Twitter Profile Photo

Simon Willison Great work and a very elegant idea! I’m curious how the multi-turn chat case is handled - specifically when the prompt expects an adversarially controlled summary of the resulting action to be fed back into the context window, either for the user to consider or for the P-LLM to