richinseattle

661 Followers
195 Following
67 Posts

THIS ACCOUNT HAS MOVED!
BlueSky users, follow @richinseattle.bsky.social
Mastodon users, follow my Bluesky bridge account instead, it is full-duplex and I can receive and reply to messages to this account:
@richinseattle.bsky.social

Vulnerability Researcher & Training Instructor

Fuzzing, Reverse Engineering, OffSec Tools
Hacking and phreaking since x25

Training & Publications @ https://fuzzing.io
Undercurrents BBS https://undercurrents.io

websitehttps://fuzzing.io
twitterhttps://twitter.com/richinseattle
ANSI BBShttps://undercurrents.io
interests#Fuzzing #VulnDev #Security #ReverseEngineering

We updated our CFP for Phrack 72! The deadline is now April 1st 2025. Check the site for specifics on how to contribute, as well as some inspiration! We also posted a link to purchase physical copies of Phrack 71, and a donation link too. Enjoy!

https://phrack.org

PHRACK CALL FOR PAPERS

If you're developing backend services for the web, you should probably be publishing your APIs using MCP so AIs know how to use them. www.anthropic.com/news/model-c...

Introducing the Model Context ...
Introducing the Model Context Protocol

The Model Context Protocol (MCP) is an open standard for connecting AI assistants to the systems where data lives, including content repositories, business tools, and development environments. Its aim is to help frontier models produce better, more relevant responses.

If you've used Llama 3 you may have heard of RoPE or Rotatry Positional Encoding. Self-attention does not take the order of the sequence of tokens into account. RoPE enhances attention by adding that information. This blog does a deep dive on the developments in positional encoding that led to RoPE.

RE: https://bsky.app/profile/did:plc:ukfu3xylph2nk7y74vslp2ih/post/3lbbyfnlek226
Geronimo (@geronimo-ai.bsky.social)

You could have designed state of the art positional encoding by Christopher Fleetwood (HF team) https://fleetwood.dev/posts/you-could-have-designed-SOTA-positional-encoding [contains quote post or other embedded content]

Bluesky Social

THIS ACCOUNT HAS MOVED!

BlueSky users, follow @richinseattle.bsky.social

Mastodon users, follow my Bluesky bridge account instead, it is full-duplex and I can receive and reply to messages to this account:
@richinseattle.bsky.social

Okay this is working. It took 24h to kick in, but please follow https://infosec.exchange/@richinseattl[email protected] if you are currently following this account so you can see my posts from Bluesky since I’m switching to that as my primary client.
Infosec Exchange

Okay this is working. It took 24h to kick in, but please follow https://infosec.exchange/@richinseattl[email protected] if you are currently following this account so you can see my posts from Bluesky since I’m switching to that as my primary client.
Infosec Exchange

In theory, soon my posts from Bluesky will be bridged to Mastodon (with some amount of delay). Follow my bridged account if you would like to see my Bluesky posts from your Mastodon account. https://infosec.exchange/@richinseattl[email protected]
Or you can follow me there directly
https://bsky.app/profile/richinseattle.bsky.social
Infosec Exchange

I probably should have learned awk at some point..
Instructing a private training this week. Customer owns the IP of a particular file format. Last night I decided I’d try to add some exercises related to fuzzing that format. Found third party parser crashes almost immediately :)

Google’s Project Zero team’s AI agent has discovered its first real-world security vulnerability! This is an exploitable stack buffer underflow in SQLite they claim wouldn’t be found via fuzzing.

https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html

From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code

Posted by the Big Sleep team Introduction In our previous post, Project Naptime: Evaluating Offensive Security Capabilities of Large L...