@kgndiue

6 Followers
63 Following
321 Posts
After receiving the first LLM-generated pull requests, I have decided to blanket no longer look at those. When studying a PR, I take into account who made it, and if they've previously been careful developers. LLM-generated code I have no idea about, and the amount of scrutiny required is just too much. Because I have to assume you have no idea what you are doing.
@SnoopJ @tante From now on I think I'll just respond "I can just go straight to ChatGPT next time if you're no longer needed."
I personally consider "I asked ChatGPT to generate a response to you" not witty but a form of an insult. Don't do that please. If that is how you want to talk to people at least don't tell me. It's offensive.

Do you understand why Trump has lifted the oil sanctions that were punishing Iran, the country he’s bombing, and Russia, the country that’s helping it?

Do you understand why Trump is sending 5,000 Marines to sail through the Strait of Hormuz while complaining that none of our friends and allies will help him reopen it?

Here's the whole explanation.

https://no01.substack.com/p/march-19-21-god-is-a-comedian

March, 19-21: God is a comedian

A stiff drink is recommended

Gold and Geopolitics
Ganz frisch von mir. Die Wissenschaft hat festgestellt: das mit den KI-Agenten geht schief. (und zwar nicht, weil Superintelligenz und Weltuntergang, sondern weil Natur von KI-Systemen und so)
Freebie-Link fΓΌr euch
https://www.zeit.de/digital/datenschutz/2026-03/ki-agenten-studie-software-daten-sicherheit?freebie=b79c27e5
KI-Agenten: Das ist erst der Anfang des Chaos

Der Hype um OpenClaw befeuert einen Streit in der Szene. Wie gefΓ€hrlich sind KI-Agenten? Eine neue Studie zeigt nun die verheerenden Ergebnisse eines Experiments.

DIE ZEIT

β€œOur work demonstrates that π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄ is unreliable for the detection of illicit content: it is easy to incriminate someone by sending them false content with a hash value close to illicit content (a false positive) and to avoid detection of illicit content with minimal modifications to an image (a false negative)”

https://eprint.iacr.org/2026/486
https://www.pseudodna.eu

White-Box Attacks on PhotoDNA Perceptual Hash Function

π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄ is a widely deployed perceptual hash function used for the detection of illicit content such as Child Sexual Abuse Material (CSAM). This paper presents the first mathematical description of 𝐴𝑙𝑙𝑒𝑔𝑒𝑑 π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄, a new function which has identical outputs to that of π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄ for a large database of test images. From this description, several design weaknesses are identified: the algorithm is piece-wise linear and differentiable, the hash value only depends on the sum of the RGB values of each pixel, and it is trivial to find images with hash value equal to all zeroes. The paper further demonstrates that gradient-based optimization techniques and quadratic programming can exploit the mathematical weaknesses of 𝐴𝑙𝑙𝑒𝑔𝑒𝑑 π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄ and π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄ to produce visually appealing exact collisions and second preimages; for near-collisions and near-second-preimages the image quality can be further improved. The same techniques can be used to recover the rough shapes of an image from its hash value, disproving the claim from the designer that π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄ is irreversible. Finally, it is also shown that it is easy to produce high-quality perceptually identical images with a hash value that is far from the original image allowing to avoid detection. We have implemented our attacks on a large set of varied images and we have tested them on both 𝐴𝑙𝑙𝑒𝑔𝑒𝑑 π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄ and π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄. Our attacks have success rates close or equal to 100% and run in seconds or minutes on a personal laptop; they present a substantial improvement over earlier work that requires hours on parallel machines and that results only in near-collisions. We believe that with additional optimization of the parameters, the image quality and/or the attack performance can be further improved. Our work demonstrates that π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄ is unreliable for the detection of illicit content: it is easy to incriminate someone by sending them false content with a hash value close to illicit content (a false positive) and to avoid detection of illicit content with minimal modifications to an image (a false negative). False positives and leakage of information are particularly problematic in a Client Side Scanning (CSS) scenario as envisaged by several countries, where large hash databases would be stored on every user device and billions of images would be hashed with π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄ every day. Overall, our research cast serious doubts on the suitability of π‘ƒβ„Žπ‘œπ‘‘π‘œπ·π‘π΄for the large-scale detection of illicit content.

IACR Cryptology ePrint Archive
😑 bald folgt mein rant gegen all die schweizer banken und sonstige unternehmen, die graphene os nicht mehr akzeptieren und keine apps mehr anbieten...

This week's comic: The Big Dumb War Cycle

#war #foreignpolicy #uspol #cartoon