Behind Reddit: Ohanian and Huffman - Negative PID

Reddit began as a small experiment created by two university friends. Over time it grew into one of the world’s most influential social platforms. The site is

Negative PID
Behind Reddit: Ohanian and Huffman - Negative PID

Reddit began as a small experiment created by two university friends. Over time it grew into one of the world’s most influential social platforms. The site is

Negative PID

Reddit’s Cofounder And CEO Steve Huffman Is Now A Billionaire

Strong ad sales have propelled Steve Huffman into the billionaire ranks. Now he’s charting a new course, aiming…
#NewsBeep #News #Headlines #AI #alexisohanian #billionaire #Google #huffman #Latvia #LV #OpenAI #Reddit #SocialMedia #stevehuffman #subreddit
https://www.newsbeep.com/224337/

Ok #Rust #bzip2 implementation done … in principle 😄 The compression test ran on a #LoremIpsum text file. A more realistic sample would have probably resulted in a much worse ratio. The BWT encoding step is ultra slow because I chose a naive approach instead of using a runtime-optimized but more complex algorithm. I'm also producing only one #Huffman tree for the whole file, which will also significantly degrade compression performance in longer and less homogeneous inputs.
zlib 的視覺化互動

看到「flateview (via)」這個有趣的網站,在網站上面可以自由的塞資料進去,然後他會解釋 zlib 壓出來的東西所代表的意義。 我拿維基百科英文版的 Kalafina 條目,第一句丟進去: Kalafina (カラフィナ) is a Japanese vocal group formed by com...

Gea-Suan Lin's BLOG
🌘 [CTF] Google CTF 2025 - webz:利用 zlib 的 Huffman 編碼表
➤ 從優化到漏洞:揭開 zlib Huffman 編碼表的攻擊面紗
https://velog.io/@0range1337/CTF-Google-CTF-2025-webz-Exploiting-zlibs-Huffman-Code-Table-English
本文詳述瞭如何在 Google CTF 2025 的 webz 挑戰中,利用 zlib 函式庫中的 Huffman 編碼表漏洞來進行攻擊。作者透過分析 Google-zlib 的原始碼,特別是 patch 後的 inftrees.c,發現了移除檢查機制並擴大 Huffman 表格空間的優化措施。這些改動導致了 `inflate_fast` 函式中的潛在問題,最終透過觀察 `inflate_fast` 的運作方式,發現了利用 `uninitialized Huffman Code Table` 和 `Str
#CTF #web security #zlib #Huffman coding #vulnerability
[CTF] Google CTF 2025 - webz : Exploiting zlib's Huffman Code Table [English]

webz is a zlib exploitation challenge from Google CTF 2025. The Google-zlib implementation provided in the challenge is not upstream; it’s a version w

[CTF] Google CTF 2025 - webz : Exploiting zlib's Huffman Code Table [English]

webz is a zlib exploitation challenge from Google CTF 2025. The Google-zlib implementation provided in the challenge is not upstream; it’s a version w

🌘 剖析 Deflate 壓縮演算法
➤ 從 Gzip 壓縮字串到手動解碼 Deflate 的技術解析
https://jjrscott.com/to-deflate-or-not/
本文作者深入剖析 Deflate 壓縮演算法的運作原理,透過手動解碼一段 Gzip 壓縮的字串,展示如何將原始資料轉換為壓縮後的位元流,並進一步解析其中包含的 LZ77 複製指令與 Huffman 編碼。雖然作者成功將 24 位元組的字串壓縮至約 16 位元組,但此過程也凸顯了手動解碼的複雜性。
+ 作者的實踐方法非常直觀,讓我對 Deflate 的內部機制有了更清晰的認識。不過手動解碼確實很花時間!
+ 這篇分析真是太棒了,對於想深入瞭解壓縮技術的開發者來說是絕佳的資源。希望未來能看到更多類似的技術拆解。
#壓縮演算法 #Deflate #Gzip #LZ77 #Huffman 編碼
Understanding Deflate

A very simple worked example

jjrscott

@kardinal691

The #Huffman channel on YouTube has turned into a propaganda feed, with lots of #Russian language replies. It's not dissimilar to #Tucker_Carson 's puff piece from #Moscow. The last we've heard from #Derek_Huffman was a month ago. Chances are, he's not on the line of contact. He's much more use to the Russian #propaganda effort if he remains alive.

FFmpeg 8.0 codename "Huffman" was released. David Albert Huffman (August 9, 1925 - October 7, 1999) was an American pioneer in computer science, known for his Huffman coding. In computer science and information theory, a Huffman code is a particular type of optimal prefix code that is commonly used for lossless data compression.

#FFmpeg #Huffman