/dev/posts/

Pass-the-permission-ticket vulnerability in UMA 2.0

Published:

In the User-Managed Access (UMA) 2.0 protocol, a malicious resource server (or a malicious server acting as a resource server) can obtain a requesting party (access) token (RPT) intended for another UMA resource server from a UMA client by passing a permission ticket obtained from the target resource server to the UMA client. This can compromise the privacy (confidentiality) and integrity of UMA protected resources.

Read more…

Donald Trump's post-truth alternative facts about Ukraine

Published:

Some notes about Donald Trump's 2025-02-19 weird statements about Ukraine and Volodymyr Zelenskyy.

Read more…

Neural Network Distillation

Published:

Overview of neural network distillation as done in “Distilling the Knowledge in a Neural Network” (Hinton et al, 2014).

Read more…

Exposing services in/out Podman containers

Published:

Some more tips for interacting with the namespaces of Podman containers.

Read more…

Transformer-decoder language models

Published:

Some notes on how transformer-decoder language models work, taking GPT-2 as an example, and with lots references in order to dig deeper.

Read more…

GitHub Copilot instructions

Give me your prompt, would you kindly?

Published:

Extracting the system prompt from GitHub CoPilot.

Read more…

Bypassing XSS filters

Published:

In this post, I am describing some payloads which I used to bypass two distinct XSS filter implementations (such as Web Application Firewalls (WAF)) as well as the approach to design them.

Read more…

WebSub sequence diagram

Published:

A sequence diagram for WebSub (formerly PubSubHubbub).

Read more…

The FBI recommends using ad blockers

Published:

An interesting note from the FBI.

Read more…

UMA 2.0 diagrams

Published:

Some diagrams (mostly sequence diagrams) about UMA 2.0.

Read more…

Page 2 of 12 | | | JSON Feed | Atom Feed