Found 4 bookmarks
Custom sorting
A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux
A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux
This document explores methods for squeezing excess bytes out of simple programs. (Of course, the more practical purpose of this document is to describe a few of the inner workings of the ELF file format and the Linux operating system. But hopefully you can also learn something about how to make really teensy ELF executables in the process.)
·muppetlabs.com·
A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux
How We Executed A Critical Supply Chain Attack On Pytorch
How We Executed A Critical Supply Chain Attack On Pytorch

"Four months ago, Adnan Khan and I exploited a critical CI/CD vulnerability in PyTorch, one of the world’s leading ML platforms. Used by titans like Google, Meta, Boeing, and Lockheed Martin, PyTorch is a major target for hackers and nation-states alike.

Thankfully, we exploited this vulnerability before the bad guys.

Here is how we did it."

·johnstawinski.com·
How We Executed A Critical Supply Chain Attack On Pytorch
Mondo 2000 - Anarchivism
Mondo 2000 - Anarchivism
Mondo 2000 was a glossy cyberculture magazine published in California during the 1980s and 1990s. It covered cyberpunk topics such as virtual reality and smart drugs. It was a more anarchic and subversive prototype for the later-founded Wired Magazine.
·anarchivism.org·
Mondo 2000 - Anarchivism