Invasion of Czechoslovakia in 1968
Published:
On August 20 1968, Czechoslovakia was invaded by the armies of Warsaw Pact.
Published:
On August 20 1968, Czechoslovakia was invaded by the armies of Warsaw Pact.
Published:
In a previous post, I described a pass-the-permission-ticket vulnerability in UMA 2.0 in which a malicious UMA resource server could kindly ask a UMA client to give it access tokens actually intended for another UMA resource server. In this post, I am describing a similar attack when the authorization server is malicious.
Published:
In the User-Managed Access (UMA) 2.0 protocol, a malicious resource server (or a malicious server acting as a resource server) can obtain a requesting party (access) token (RPT) intended for another UMA resource server from a UMA client by passing a permission ticket obtained from the target resource server to the UMA client. This can compromise the privacy (confidentiality) and integrity of UMA protected resources.
Published:
Some notes about Donald Trump's 2025-02-19 weird statements about Ukraine and Volodymyr Zelenskyy.
Published:
Overview of neural network distillation as done in “Distilling the Knowledge in a Neural Network” (Hinton et al, 2014).
Published:
Some more tips for interacting with the namespaces of Podman containers.
Published:
Some notes on how transformer-decoder language models work, taking GPT-2 as an example, and with lots references in order to dig deeper.
Page 1 of 1 | Previous page | Next page | JSON Feed | Atom Feed