| | Show HN: Local RAG with Ollama, Gemma and RETSim (elie.net) |
|
4 points by ebursztein 8 months ago | past
|
| | Lessons Learned from Developing Secure AI Workflows at Google (elie.net) |
|
1 point by ebursztein 8 months ago | past
|
| | Making security keys quantum resilient (elie.net) |
|
1 point by ebursztein on Aug 26, 2023 | past
|
| | On the consequences of AI workforce entering the market (elie.net) |
|
1 point by ebursztein on June 26, 2023 | past
|
| | AI helps keeping Gmail inboxes malware free [slides] (elie.net) |
|
1 point by ebursztein on April 25, 2023 | past | 1 comment
|
| | Building Safe End-to-End Encrypted Services for Business – A Google Perspective (elie.net) |
|
1 point by ebursztein on June 6, 2022 | past
|
| | Hate, Harassment, and the Changing Landscape of Online Abuse (elie.net) |
|
1 point by ebursztein on Sept 19, 2021 | past
|
| | Who is targeted by email-based phishing and malware? (elie.net) |
|
2 points by Spellman on Sept 13, 2021 | past
|
| | Exposing high-end poker cheating devices (2016) (elie.net) |
|
2 points by jnieminen on Sept 5, 2021 | past
|
| | Why wouldn't someone think of democracy as a target? (elie.net) |
|
2 points by ebursztein on Aug 27, 2021 | past
|
| | Deep-Cryptanalysis – Fashion or Revolution? (elie.net) |
|
2 points by ebursztein on Aug 26, 2021 | past
|
| | 3M smiles during the pandemic – the retrospective (elie.net) |
|
1 point by ebursztein on July 18, 2021 | past
|
| | Hacker's guide to deep-learning side-channel attacks: code walkthrough (elie.net) |
|
2 points by dboeke on June 11, 2021 | past
|
| | How to use TensoFlow to recover AES keys from power traces (elie.net) |
|
1 point by markblue on June 8, 2021 | past
|
| | Deep-learning based side-channel attacks with TensorFlow tutorial (elie.net) |
|
4 points by ebursztein on June 6, 2021 | past
|
| | Deep-learning side-channel attacks: the theory (elie.net) |
|
42 points by ebursztein on May 22, 2021 | past | 2 comments
|
| | Account Protections – A Google Perspective (elie.net) |
|
1 point by ebursztein on April 17, 2021 | past | 2 comments
|
| | How to trace ransomware payments end-to-end (2017) (elie.net) |
|
1 point by baba_ramdev on Feb 22, 2021 | past
|
| | A Hacker’s guide to reducing side-channel attack surfaces using deep-learning (elie.net) |
|
2 points by ebursztein on Aug 6, 2020 | past
|
| | Malicious Documents Emerging Trends: A Gmail Perspective (elie.net) |
|
1 point by ebursztein on Feb 26, 2020 | past
|
| | Five Years of the Right to Be Forgotten [pdf] (elie.net) |
|
1 point by randomwalker on Dec 14, 2019 | past
|
| | Insights about the first five years of Right to Be Forgotten requests at Google (elie.net) |
|
2 points by blueiridum on Dec 14, 2019 | past
|
| | A Hacker Guide to Deep-Learning Based AES Side Channel Attacks (elie.net) |
|
4 points by tprynn on Aug 10, 2019 | past
|
| | Deconstructing the Phishing Campaigns That Target Gmail Users (elie.net) |
|
1 point by tprynn on Aug 8, 2019 | past
|
| | Fuller House: Exposing high-end poker cheating devices (2016) (elie.net) |
|
91 points by Jerry2 on June 14, 2019 | past | 23 comments
|
| | Understanding online safety and privacy challenges faced by South Asian women (elie.net) |
|
2 points by cealtea on June 11, 2019 | past
|
| | Online safety and privacy challenges faced by South Asian women (elie.net) |
|
1 point by glloydell on June 9, 2019 | past
|
| | Understanding the safety and privacy challenges faced by South Asian women (elie.net) |
|
3 points by ebursztein on June 7, 2019 | past
|
| | Password checkup: from 0 to 650k users in 20 days (elie.net) |
|
73 points by ebursztein on April 3, 2019 | past | 15 comments
|
| | Password checkup: from 0 to 650k users in 20 days (elie.net) |
|
1 point by ebursztein on April 2, 2019 | past
|
|
|
More |