Hacker News new | past | comments | ask | show | jobs | submit | from login
Show HN: Local RAG with Ollama, Gemma and RETSim (elie.net)
4 points by ebursztein 8 months ago | past
Lessons Learned from Developing Secure AI Workflows at Google (elie.net)
1 point by ebursztein 8 months ago | past
Making security keys quantum resilient (elie.net)
1 point by ebursztein on Aug 26, 2023 | past
On the consequences of AI workforce entering the market (elie.net)
1 point by ebursztein on June 26, 2023 | past
AI helps keeping Gmail inboxes malware free [slides] (elie.net)
1 point by ebursztein on April 25, 2023 | past | 1 comment
Building Safe End-to-End Encrypted Services for Business – A Google Perspective (elie.net)
1 point by ebursztein on June 6, 2022 | past
Hate, Harassment, and the Changing Landscape of Online Abuse (elie.net)
1 point by ebursztein on Sept 19, 2021 | past
Who is targeted by email-based phishing and malware? (elie.net)
2 points by Spellman on Sept 13, 2021 | past
Exposing high-end poker cheating devices (2016) (elie.net)
2 points by jnieminen on Sept 5, 2021 | past
Why wouldn't someone think of democracy as a target? (elie.net)
2 points by ebursztein on Aug 27, 2021 | past
Deep-Cryptanalysis – Fashion or Revolution? (elie.net)
2 points by ebursztein on Aug 26, 2021 | past
3M smiles during the pandemic – the retrospective (elie.net)
1 point by ebursztein on July 18, 2021 | past
Hacker's guide to deep-learning side-channel attacks: code walkthrough (elie.net)
2 points by dboeke on June 11, 2021 | past
How to use TensoFlow to recover AES keys from power traces (elie.net)
1 point by markblue on June 8, 2021 | past
Deep-learning based side-channel attacks with TensorFlow tutorial (elie.net)
4 points by ebursztein on June 6, 2021 | past
Deep-learning side-channel attacks: the theory (elie.net)
42 points by ebursztein on May 22, 2021 | past | 2 comments
Account Protections – A Google Perspective (elie.net)
1 point by ebursztein on April 17, 2021 | past | 2 comments
How to trace ransomware payments end-to-end (2017) (elie.net)
1 point by baba_ramdev on Feb 22, 2021 | past
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning (elie.net)
2 points by ebursztein on Aug 6, 2020 | past
Malicious Documents Emerging Trends: A Gmail Perspective (elie.net)
1 point by ebursztein on Feb 26, 2020 | past
Five Years of the Right to Be Forgotten [pdf] (elie.net)
1 point by randomwalker on Dec 14, 2019 | past
Insights about the first five years of Right to Be Forgotten requests at Google (elie.net)
2 points by blueiridum on Dec 14, 2019 | past
A Hacker Guide to Deep-Learning Based AES Side Channel Attacks (elie.net)
4 points by tprynn on Aug 10, 2019 | past
Deconstructing the Phishing Campaigns That Target Gmail Users (elie.net)
1 point by tprynn on Aug 8, 2019 | past
Fuller House: Exposing high-end poker cheating devices (2016) (elie.net)
91 points by Jerry2 on June 14, 2019 | past | 23 comments
Understanding online safety and privacy challenges faced by South Asian women (elie.net)
2 points by cealtea on June 11, 2019 | past
Online safety and privacy challenges faced by South Asian women (elie.net)
1 point by glloydell on June 9, 2019 | past
Understanding the safety and privacy challenges faced by South Asian women (elie.net)
3 points by ebursztein on June 7, 2019 | past
Password checkup: from 0 to 650k users in 20 days (elie.net)
73 points by ebursztein on April 3, 2019 | past | 15 comments
Password checkup: from 0 to 650k users in 20 days (elie.net)
1 point by ebursztein on April 2, 2019 | past

Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: