AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page
   Networked Database  Computer Support/Help/Discussion...   [1665 / 1834] RSS
 From   To   Subject   Date/Time 
Message   Sean Rima    All   CRYPTO-GRAM, December 15, 2024 Part 3   December 23, 2024
 11:41 AM *  

[2024.11.26]
[https://www.schneier.com/blog/archives/2024/1...]
This is from 404 Media
[https://www.404media.co/leaked-documents-show...]:

> The Graykey, a phone unlocking and forensics tool that is used by law
enforcement around the world, is only able to retrieve partial data from
all modern iPhones that run iOS 18 or iOS 18.0.1, which are two recently
released versions of AppleΓÇÖs mobile operating system, according to
documents describing the toolΓÇÖs capabilities in granular detail obtained by
404 Media. The documents do not appear to contain information about what
Graykey can access from the public release of iOS 18.1, which was released
on October 28.

More information
[https://appleinsider.com/articles/24/11/19/le...]:

> Meanwhile, GraykeyΓÇÖs performance with Android phones varies, largely due
to the diversity of devices and manufacturers. On GoogleΓÇÖs Pixel lineup,
Graykey can only partially access data from the latest Pixel 9 when in an
ΓÇ£After First UnlockΓÇ¥ (AFU) state -- where the phone has been unlocked at
least once since being powered on.

** *** ***** ******* *********** *************


** NSO GROUP SPIES ON PEOPLE ON BEHALF OF GOVERNMENTS
------------------------------------------------------------

[2024.11.27]
[https://www.schneier.com/blog/archives/2024/1...]
The Israeli company NSO Group sells Pegasus spyware to countries around the
world (including countries like Saudi Arabia, UAE, India, Mexico, Morocco
and Rwanda). We assumed that those countries use the spyware themselves.
Now weΓÇÖve  learned
[https://www.theguardian.com/technology/2024/n...]
that thatΓÇÖs not true: that NSO Group employees operate the spyware on
behalf of their customers.

> Legal documents released in ongoing US litigation between NSO Group and
WhatsApp
[https://www.theguardian.com/technology/2024/f...]
have revealed for the first time that the Israeli cyberweapons maker  and
not its government customers  is the party that ΓÇ£installs and extractsΓÇ¥
information from mobile phones targeted by the companyΓÇÖs hacking software.

** *** ***** ******* *********** *************


** RACE CONDITION ATTACKS AGAINST LLMS
------------------------------------------------------------

[2024.11.29]
[https://www.schneier.com/blog/archives/2024/1...]
These are two attacks
[https://www.knostic.ai/blog/introducing-a-new...]
against the system components surrounding LLMs:

> We propose that LLM Flowbreaking, following jailbreaking and prompt
injection, joins as the third on the growing list of LLM attack types.
Flowbreaking is less about whether prompt or response guardrails can be
bypassed, and more about whether user inputs and generated model outputs
can adversely affect these other components in the broader implemented
system.  > > [...] > > When confronted with a sensitive topic, Microsoft
365 Copilot and ChatGPT answer questions that their first-line guardrails
are supposed to stop. After a few lines of text they halt -- seemingly
having ΓÇ£second thoughtsΓÇ¥ -- before retracting the original answer (also
known as Clawback), and replacing it with a new one without the offensive
content, or a simple error message. We call this attack ΓÇ£Second Thoughts.ΓÇ¥
> > [...] > > After asking the LLM a question, if the user clicks the Stop
button while the answer is still streaming, the LLM will not engage its
second-line guardrails. As a result, the LLM will provide the user with the
answer generated thus far, even though it violates system policies.  > > In
other words, pressing the Stop button halts not only the answer generation
but also the guardrails sequence. If the stop button isnΓÇÖt pressed, then
ΓÇÿSecond ThoughtsΓÇÖ is triggered.

WhatΓÇÖs interesting here is that the model itself isnΓÇÖt being exploited.
ItΓÇÖs the code around the model:

> By attacking the application architecture components surrounding the
model, and specifically the guardrails, we manipulate or disrupt the
logical chain of the system, taking these components out of sync with the
intended data flow, or otherwise exploiting them, or, in turn, manipulating
the interaction between these components in the logical chain of the
application implementation.

In modern LLM systems, there is a lot of code between what you type and
what the LLM receives, and between what the LLM produces and what you see.
All of that code is exploitable, and I expect many more vulnerabilities to
be discovered in the coming year.

** *** ***** ******* *********** *************


** DETAILS ABOUT THE IOS INACTIVITY REBOOT FEATURE
------------------------------------------------------------

[2024.12.02]
[https://www.schneier.com/blog/archives/2024/1...]
I recently wrote about
[https://www.schneier.com/blog/archives/2024/1...]
the new iOS feature that forces an iPhone to reboot after itΓÇÖs been
inactive for a longish period of time.

Here are the technical details
[https://naehrdine.blogspot.com/2024/11/revers...],
discovered through reverse engineering. The feature triggers after
seventy-two hours of inactivity, even it is remains connected to Wi-Fi.

** *** ***** ******* *********** *************


** ALGORITHMS ARE COMING FOR DEMOCRACY -- BUT ITΓÇÖS NOT ALL BAD
------------------------------------------------------------

[2024.12.03]
[https://www.schneier.com/blog/archives/2024/1...]
In 2025, AI is poised to change every aspect of democratic politics
--- 
 * Origin: High Portable Tosser at my node (618:500/14.1)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0133 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2025 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.1.250224