Dark mode: ON

Infosec Decoded Season 3 #94: Fake Females

With @kaitlynguru@infosec.exchange and @sambowne@infosec.exchange

Tue, Nov 28, 2023

Sam Bowne

Baby Kyber: Post-Quantum Encryption Hands-On Project
CTF scoring engine at the bottom of this page

64% of workers have passed off generative AI work as their own
The 3 biggest risks from generative AI - and how to deal with them
God Help Us, Let's Try To Understand AI Monosemanticity

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
A MitM attacker physically near a bluetooth device can downgrade the SE number during bluetooth pairing, lowering the entropy of the session key. Now that attacker can brute-force the session key and deduce keys for previous and subsequent sessions. This works against many devices. The authors propose a fix for the Bluetooth protocol and hope it will be adopted soon.

Kaitlyn Handelman

Big brands keep dropping X over antisemitism; $75M loss, report estimates

5000-YEAR-OLD TABLETS CAN NOW BE DECODED BY ARTIFICIAL INTELLIGENCE, NEW RESEARCH REVEALS

China begins building underwater data center with performance equal to 6 million PCs — aims to save 122 million KWh of electricity and nearly ten soccer fields of land

Microsoft and Amazon Web Services executives are bailing on this tech conference after the organizer was accused of using fake female panelists