Insecurity Princess πŸŒˆπŸ’–πŸ”₯

3.4K Followers
337 Following
9.5K Posts

I write about power dynamics in engineering management

Insecurity Princess. Clod Security leader. Queer femme mathematician. Dismantling systemic barriers in tech, one fencepost problem at a time

Wife of https://infosec.exchange/@sophieschmieg

Websitehttps://www.sar.ai
LocationBay Area, CA, USA
tootfinderhttps://tootfinder.ch/index.php?join=1
Leadership Writinghttps://mitm.blog
Security Writinghttps://keymaterial.net
Pronounsshe/her
The best description of a kitten I've ever read:
"you need to imagine that you have a toddler who can fly!"

People keep assuring me that LLMs writing code is a revolution, that as long as we maintain sound engineering practices and tight code review they're actually extruding code fit for purpose in a fraction of the time it would take a human.

And every damned time, every damned time any of that code surfaces, like Anthropic's flagship offering just did, somehow it's exactly the pile of steaming technical debt and fifteen year old Stack Overflow snippets we were assured your careful oversight made sure it isn't.

Can someone please explain this to me? Is everyone but you simply prompting it wrong?

It's a good thing programmers aren't susceptible to hubris in any way, or this would have been so much worse.

New post: The 'Paperwork Flood': How I Drowned a Bureaucrat before dinner. https://sightlessscribbles.com/posts/the-paperwork-flood/
The 'Paperwork Flood': How I Drowned a Bureaucrat before dinner., Sightless Scribbles

A fabulously gay blind author.

This is peak malicious compliance and I love it

https://sightlessscribbles.com/posts/the-paperwork-flood/

Edit : the blog author is on the fediverse if you want to follow him here, and he maintains a follow page on his site with many options!

The 'Paperwork Flood': How I Drowned a Bureaucrat before dinner., Sightless Scribbles

A fabulously gay blind author.

Brutal.

When Microsoft acquired GitHub.

Audre Lorde's "master's tools" speech was not about tech platforms. So why does tech discourse keep citing it as if it were? I write about what happens when a Black feminist theorist's words get borrowed, stripped of context, and made to do work they were never meant to do.

https://tarakiyee.com/on-the-enshittification-of-audre-lorde-the-masters-tools-in-tech-discourse/ #enshittification #AudreLorde #techpolicy

On The Enshittification of Audre Lorde: "The Master's Tools" in Tech Discourse

πŸ–ΌοΈCover Photo: Train at the Nairobi terminus of the Mombasa–Nairobi Standard Gauge Railway. It runs parallel to the Uganda Railway that was completed in 1901. The first fare-paying passengers boarded the "Madaraka Express" on Madaraka Day (1 June 2017), the 54th anniversary of Kenya's attainment of self-rule from Great

Do Flamingos Know They're Pink

Oh, and in case you weren't having enough fun, here are some updated resource estimates for running Shor's on elliptic curves, unfortunately weirdly focused on cryptocurrencies.

Fun fact: I almost found a soundness problem in that zero knowledge proof that was based on a quine. Unfortunately the circuit cannot produce quines.

https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/

Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly

Are we having fun yet?

https://arxiv.org/abs/2603.28627

Shor's algorithm is possible with as few as 10,000 reconfigurable atomic qubits

Quantum computers have the potential to perform computational tasks beyond the reach of classical machines. A prominent example is Shor's algorithm for integer factorization and discrete logarithms, which is of both fundamental importance and practical relevance to cryptography. However, due to the high overhead of quantum error correction, optimized resource estimates for cryptographically relevant instances of Shor's algorithm require millions of physical qubits. Here, by leveraging advances in high-rate quantum error-correcting codes, efficient logical instruction sets, and circuit design, we show that Shor's algorithm can be executed at cryptographically relevant scales with as few as 10,000 reconfigurable atomic qubits. Increasing the number of physical qubits improves time efficiency by enabling greater parallelism; under plausible assumptions, the runtime for discrete logarithms on the P-256 elliptic curve could be just a few days for a system with 26,000 physical qubits, while the runtime for factoring RSA-2048 integers is one to two orders of magnitude longer. Recent neutral-atom experiments have demonstrated universal fault-tolerant operations below the error-correction threshold, computation on arrays of hundreds of qubits, and trapping arrays with more than 6,000 highly coherent qubits. Although substantial engineering challenges remain, our theoretical analysis indicates that an appropriately designed neutral-atom architecture could support quantum computation at cryptographically relevant scales. More broadly, these results highlight the capability of neutral atoms for fault-tolerant quantum computing with wide-ranging scientific and technological applications.

arXiv.org