Behind Reddit: Ohanian and Huffman - Negative PID

Reddit began as a small experiment created by two university friends. Over time it grew into one of the world’s most influential social platforms. The site is

Negative PID
Behind Reddit: Ohanian and Huffman - Negative PID

Reddit began as a small experiment created by two university friends. Over time it grew into one of the world’s most influential social platforms. The site is

Negative PID
Ok #Rust #bzip2 implementation done … in principle 😄 The compression test ran on a #LoremIpsum text file. A more realistic sample would have probably resulted in a much worse ratio. The BWT encoding step is ultra slow because I chose a naive approach instead of using a runtime-optimized but more complex algorithm. I'm also producing only one #Huffman tree for the whole file, which will also significantly degrade compression performance in longer and less homogeneous inputs.
zlib 的視覺化互動

看到「flateview (via)」這個有趣的網站,在網站上面可以自由的塞資料進去,然後他會解釋 zlib 壓出來的東西所代表的意義。 我拿維基百科英文版的 Kalafina 條目,第一句丟進去: Kalafina (カラフィナ) is a Japanese vocal group formed by com...

Gea-Suan Lin's BLOG
🌘 [CTF] Google CTF 2025 - webz:利用 zlib 的 Huffman 編碼表
➤ 從優化到漏洞:揭開 zlib Huffman 編碼表的攻擊面紗
https://velog.io/@0range1337/CTF-Google-CTF-2025-webz-Exploiting-zlibs-Huffman-Code-Table-English
本文詳述瞭如何在 Google CTF 2025 的 webz 挑戰中,利用 zlib 函式庫中的 Huffman 編碼表漏洞來進行攻擊。作者透過分析 Google-zlib 的原始碼,特別是 patch 後的 inftrees.c,發現了移除檢查機制並擴大 Huffman 表格空間的優化措施。這些改動導致了 `inflate_fast` 函式中的潛在問題,最終透過觀察 `inflate_fast` 的運作方式,發現了利用 `uninitialized Huffman Code Table` 和 `Str
#CTF #web security #zlib #Huffman coding #vulnerability
[CTF] Google CTF 2025 - webz : Exploiting zlib's Huffman Code Table [English]

webz is a zlib exploitation challenge from Google CTF 2025. The Google-zlib implementation provided in the challenge is not upstream; it’s a version w

[CTF] Google CTF 2025 - webz : Exploiting zlib's Huffman Code Table [English]

webz is a zlib exploitation challenge from Google CTF 2025. The Google-zlib implementation provided in the challenge is not upstream; it’s a version w

🌘 剖析 Deflate 壓縮演算法
➤ 從 Gzip 壓縮字串到手動解碼 Deflate 的技術解析
https://jjrscott.com/to-deflate-or-not/
本文作者深入剖析 Deflate 壓縮演算法的運作原理,透過手動解碼一段 Gzip 壓縮的字串,展示如何將原始資料轉換為壓縮後的位元流,並進一步解析其中包含的 LZ77 複製指令與 Huffman 編碼。雖然作者成功將 24 位元組的字串壓縮至約 16 位元組,但此過程也凸顯了手動解碼的複雜性。
+ 作者的實踐方法非常直觀,讓我對 Deflate 的內部機制有了更清晰的認識。不過手動解碼確實很花時間!
+ 這篇分析真是太棒了,對於想深入瞭解壓縮技術的開發者來說是絕佳的資源。希望未來能看到更多類似的技術拆解。
#壓縮演算法 #Deflate #Gzip #LZ77 #Huffman 編碼
Understanding Deflate

A very simple worked example

jjrscott

@kardinal691

The #Huffman channel on YouTube has turned into a propaganda feed, with lots of #Russian language replies. It's not dissimilar to #Tucker_Carson 's puff piece from #Moscow. The last we've heard from #Derek_Huffman was a month ago. Chances are, he's not on the line of contact. He's much more use to the Russian #propaganda effort if he remains alive.

FFmpeg 8.0 codename "Huffman" was released. David Albert Huffman (August 9, 1925 - October 7, 1999) was an American pioneer in computer science, known for his Huffman coding. In computer science and information theory, a Huffman code is a particular type of optimal prefix code that is commonly used for lossless data compression.

#FFmpeg #Huffman

#FFmpeg 8.0 "#Huffman" has been released (#Libav / #MultimediaFramework) https://ffmpeg.org/
FFmpeg