Esto se ve realmente interesante. Una herramienta que permite migrar cuentas entre activitypub y ATprotocol conservando publicaciones y seguidores. Y, según entiendo, también permite migrar entre plataformas del mismo protocolo. Habrš que ver qué tal va.
https://blog.anew.social/bounce-a-cros…
This week’s edition of my @… newsletter shines a light on the impact of the Model Context Protocol (MCP) across multiple computing eras—leading right up to today.
We’ve arrived at a moment where loose coupling principles are cool (and super useful) again.
Naturally, there are some live demo nuggets in the post to help bring it all to life:
🔗
Beyond the Protocol: Unveiling Attack Vectors in the Model Context Protocol Ecosystem
Hao Song, Yiming Shen, Wenxuan Luo, Leixin Guo, Ting Chen, Jiashui Wang, Beibei Li, Xiaosong Zhang, Jiachi Chen
https://arxiv.org/abs/2506.02040
Figma releases Dev Mode Model Context Protocol server, which provides more context about how AI designs are created in Figma (Jess Weatherbed/The Verge)
https://www.theverge.com/news/679439/figma-dev-mode-mcp-server-beta-release
as_skitter: Skitter IP graph (2005)
An aggregate snapshot of the Internet Protocol (IP) graph, as measured by the traceroute tool on CAIDA's skitter infrastructure, in 2005.
This network has 1696415 nodes and 11095298 edges.
Tags: Technological, Communication, Unweighted
https://networks.skewed.de/net/as_s…
Toffoli and C$^\text{n}$NOT (n$>2$) gates in a neutral-atom platform using Rydberg coupling and dark state resonances
Sinchan Snigdha Rej, Bimalendu Deb
https://arxiv.org/abs/2507.02531
A Reinforcement Learning-Based Telematic Routing Protocol for the Internet of Underwater Things
Mohammadhossein Homaei, Mehran Tarif, Agustin Di Bartolo, Oscar Mogollon Gutierrez, Mar Avila
https://arxiv.org/abs/2506.00133
iPanda: An Intelligent Protocol Testing and Debugging Agent for Conformance Testing
Xikai Sun, Fan Dang, Kebin Liu, Xin Miao, Zihao Yang, Haimo Lu, Yawen Zheng, Yunhao Liu
https://arxiv.org/abs/2507.00378
CoInfra: A Large-Scale Cooperative Infrastructure Perception System and Dataset in Adverse Weather
Minghao Ning, Yufeng Yang, Keqi Shu, Shucheng Huang, Jiaming Zhong, Maryam Salehi, Mahdi Rahmani, Yukun Lu, Chen Sun, Aladdin Saleh, Ehsan Hashemi, Amir Khajepour
https://arxiv.org/abs/2507.02245
Some of you probably remember WAIS. An Internet search engine from the Gopher era (more specific: a search protocol). TIL: Thinking Machines (those with the massive red blinkenlights servers) were the main driver and developer of WAIS: https://en.wikipedia.org/wiki/Wide_area_information…
Next Generation Authentication for Data Spaces: An Authentication Flow Based On Grant Negotiation And Authorization Protocol For Verifiable Presentations (GNAP4VP)
Rodrigo Men\'endez, Andres Munoz-Arcentales, Joaqu\'in Salvach\'ua, Carlos Aparicio, Irene Plaza, Gabriel Huecas
https://arxiv.org/abs/2505.24698
Looking at the Common Alert Protocol (https://docs.oasis-open.org/emergency/cap/v1.2/CAP-v1.2-os.html), for our Service Alerts (
Context-aware gate set tomography: Improving the self-consistent characterization of trapped-ion universal gate sets by leveraging non-Markovianity
Pablo Vi\~nas, Alejandro Bermudez
https://arxiv.org/abs/2507.02542
Kibble-Zurek dynamics across the first-order quantum transitions of quantum Ising chains in the thermodynamic limit
Andrea Pelissetto, Davide Rossini, Ettore Vicari
https://arxiv.org/abs/2507.00178
ProxAnn: Use-Oriented Evaluations of Topic Models and Document Clustering
Alexander Hoyle, Lorena Calvo-Bartolom\'e, Jordan Boyd-Graber, Philip Resnik
https://arxiv.org/abs/2507.00828
Did you know the Palermo Protocol was adopted by the United Nations in 2000 and says “the recruitment, transportation, transfer, harboring, or receipt of people through force, fraud, or deception, with the aim of exploiting them” is human trafficking?
#ice #USpol
Three-qubit W state tomography via full and marginal state reconstructions on ibm_osaka
H. Talath, B. P. Govindaraja, B. G. Divyamani, Akshata Shenoy H., A. R. Usha Devi, Sudha
https://arxiv.org/abs/2507.02849
Replaced article(s) found for cs.AI. https://arxiv.org/list/cs.AI/new
[5/5]:
- Horus: A Protocol for Trustless Delegation Under Uncertainty
David Shi, Kevin Joo
Multi-mode NOON states generation with ultracold atoms via geodesic counterdiabatic driving
Dengis Simon, Sandro Wimberger, Peter Schlagheck
https://arxiv.org/abs/2506.01948
Real-Time In-Network Machine Learning on P4-Programmable FPGA SmartNICs with Fixed-Point Arithmetic and Taylor
Mohammad Firas Sada, John J. Graham, Mahidhar Tatineni, Dmitry Mishin, Thomas A. DeFanti, Frank W\"urthwein
https://arxiv.org/abs/2507.00428
are you a platform/embedded developer?
do you need to interact with hardware in a semi-custom manner?
would you like to suffer a lot less doing it?
if so, #GlasgowInterfaceExplorer might be for you. the code below is all you need to build a custom testbench for a DUT you've never seen before. just as easily you can add JTAG/SWD debug, protocol analyzers, etc.…
Replaced article(s) found for cs.GT. https://arxiv.org/list/cs.GT/new
[1/1]:
- Horus: A Protocol for Trustless Delegation Under Uncertainty
David Shi, Kevin Joo
An LLM Agent for Functional Bug Detection in Network Protocols
Mingwei Zheng, Chengpeng Wang, Xuwei Liu, Jinyao Guo, Shiwei Feng, Xiangyu Zhang
https://arxiv.org/abs/2506.00714
With moving my calendar away from Google I was looking for a Caldev solution, but ...
Interesting take on CalDev and encryption on Cryptpad's github page.
No chance that that will happen encrypted.
It's waiting for an solution in the Caldev protocol. 😇
[Feature request] Possibility to have CalDAV for the Calendar · Issue #823 · cryptpad/cryptpad
What if each voxel were measured with a different diffusion protocol?
Santiago Coelho, Gregory Lemberskiy, Ante Zhu, Hong-Hsi Lee, Nastaren Abad, Thomas K. F. Foo, Els Fieremans, Dmitry S. Novikov
https://arxiv.org/abs/2506.22650
I'm baffled that this guy is a respected analyst. Yeah, an infinite number of AI agents will spend their money on content from human creators, making those humans infinitely rich. I see no flaws in this model.
Effectiveness of the DEJAMPS purification protocol in noisy entangled photon systems, a Monte Carlo simulation
Vasilis Skarlatos, Nikos Konofaos
https://arxiv.org/abs/2506.22830
A Large-Scale Evolvable Dataset for Model Context Protocol Ecosystem and Security Analysis
Zhiwei Lin, Bonan Ruan, Jiahao Liu, Weibo Zhao
https://arxiv.org/abs/2506.23474
Rational Miner Behaviour, Protocol Stability, and Time Preference: An Austrian and Game-Theoretic Analysis of Bitcoin's Incentive Environment
Craig Steven Wright
https://arxiv.org/abs/2506.20965
huh, i just found this. it is clearly llm generated, and thus riddled with inaccuracies and hallucinations. but on first glance, i am very much impressed by the stuff that doesn't immediately jump at me as wrong: https://deepwiki.com/stef/libopaque and
TRMAC: A Time-Reversal-based MAC Protocol for Wireless Networks within Computing Packages
Ama Bandara, Abhijit Das, Fatima Rodriguez-Galan, Eduard Alarcon, Sergi Abadal
https://arxiv.org/abs/2506.19487
DRIVE Through the Unpredictability:From a Protocol Investigating Slip to a Metric Estimating Command Uncertainty
Nicolas Samson, William Larriv\'ee-Hardy, William Dubois, \'Elie Roy-Brouard, Edith Brotherton, Dominic Baril, Julien L\'epine, Fran\c{c}ois Pomerleau
https://arxiv.org/abs/2506.16593
I forget. What do you call it when a single political appointee overturns an established, disciplined, scientific process because he's smarter than everyone else combined? https://www.nytimes.com/2025/05/27/health/covid-vac…
The Model Context Protocol (MCP) brings Unix-style loose coupling to AI Agents.
I built a visual explainer (JSON-LD metadata included) using Google Gemini’s new Canvas feature—with an embedded Knowledge Graph to illustrate.
Check it out:
https://openlinksw.com//data/html/unix
This is just one example. "MCP" the protocol for "AI agents" is basically without security measures. It's like running random code on your infrastructure and data.
(Original title: GitHub MCP Exploited: Accessing private repositories via MCP)
https://simonwillison.net…
MPLS (network protocol) is pronounced
Energetically efficient, mediated mechanical system for precise control of hoisting operations
Mikel Palmero, Juan Gonzalo Muga, Ander Tobalina
https://arxiv.org/abs/2507.01688
The Secrets Must Not Flow: Scaling Security Verification to Large Codebases (extended version)
Linard Arquint, Samarth Kishor, Jason R. Koenig, Joey Dodds, Daniel Kroening, Peter M\"uller
https://arxiv.org/abs/2507.00595
Seeing Through the Fog: Empowering Mobile Devices to Expose and Mitigate RAN Buffer Effects on Delay-Sensitive Protocols
Yuxin Liu, Tianyang Zhang, Qiang Wu, Ju Ren, Kyle Jamieson, Yaxiong Xie
https://arxiv.org/abs/2507.00337
A double selection entanglement distillation-based state estimator
Joshua Carlo A. Casapao, Ananda G. Maity, Naphan Benchasattabuse, Michal Hajdu\v{s}ek, Akihito Soeda, Rodney Van Meter, David Elkouss
https://arxiv.org/abs/2505.24280
The Linux Foundation unveils the Agent2Agent project, with founding members including Google Cloud, AWS, and Microsoft; Google donated the protocol spec and SDK (Google Developers Blog)
https://developers.googleblog.com/en/google-cloud-donates-a2…
Decoding TCP SYN for Stronger Network Security
https://www.netscout.com/blog/asert/decoding-tcp-syn-stronger-network-security
A brief look at TCP SYNs observed by low impact honeypots. I mainly sought evidence for source address spoofing and a…
Institutional Noise, Strategic Deviation, and Intertemporal Collapse: A Formal Model of Miner Behaviour under Protocol Uncertainty
Craig Steven Wright
https://arxiv.org/abs/2506.20992
Do we know if Anthropic named their (technically garbage) "Agentic AI" protocol MCP in refence to the antagonist of the TRON movie?
From Prompt Injections to Protocol Exploits: Threats in LLM-Powered AI Agents Workflows
Mohamed Amine Ferrag, Norbert Tihanyi, Djallel Hamouda, Leandros Maglaras, Merouane Debbah
https://arxiv.org/abs/2506.23260
as_skitter: Skitter IP graph (2005)
An aggregate snapshot of the Internet Protocol (IP) graph, as measured by the traceroute tool on CAIDA's skitter infrastructure, in 2005.
This network has 1696415 nodes and 11095298 edges.
Tags: Technological, Communication, Unweighted
https://networks.skewed.de/net/as_s…
Bayesian and Markovian classical feedforward for discriminating amplitude damping channels
Milajiguli Rexiti, Stefano Mancini
https://arxiv.org/abs/2506.01851
@… say, what was the page switching protocol you've encountered with PHYs before? reg 0xD/0xE appears to be 802.3 standard
Reliable Transmission of LTP Using Reinforcement Learning-Based Adaptive FEC
Liang Chen, Yu Song, Kanglian Zhao, Juan A. Fraire, Wenfeng Li
https://arxiv.org/abs/2506.22470
Model Context Protocol (MCP) at First Glance: Studying the Security and Maintainability of MCP Servers
Mohammed Mehedi Hasan, Hao Li, Emad Fallahzadeh, Bram Adams, Ahmed E. Hassan
https://arxiv.org/abs/2506.13538
EGNInfoLeaker: Unveiling the Risks of Public Key Reuse and User Identity Leakage in Blockchain
Chenyu Li, Xueping Liang, Xiaorui Gong, Xiu Zhang
https://arxiv.org/abs/2507.01635
Electro-optic sampling of the electric-field operator for ultrabroadband pulses of Gaussian quantum light
Geehyun Yang, Sandeep Sharma, Andrey S. Moskalenko
https://arxiv.org/abs/2506.01730
Replaced article(s) found for cs.NI. https://arxiv.org/list/cs.NI/new
[1/1]:
- Retrieval Augmented Generation Based LLM Evaluation For Protocol State Machine Inference With Cha...
Youssef Maklad, Fares Wael, Wael Elsersy, Ali Hamdi
Beyond Formal Semantics for Capabilities and Skills: Model Context Protocol in Manufacturing
Luis Miguel Vieira da Silva, Aljosha K\"ocher, Felix Gehlhoff
https://arxiv.org/abs/2506.11180
Evolution of tripartite entanglement in three-qubit Quantum Gravity-Induced Entanglement of Masses (QGEM) with quantum decoherence
Pablo Guillermo Carmona Rufo, Anupam Mazumdar, Carlos Sab\'in
https://arxiv.org/abs/2507.01007
Reliable Image Transmission in CPS-based Pub/Sub
Everson Flores, Bruna Guterres, Thomaz Pereira Junior, Paula Barros, Alberto Cabral, Cristiana Lima Dora, Marcelo Malheiros, Marcelo Pias
https://arxiv.org/abs/2506.22875
AGI Enabled Solutions For IoX Layers Bottlenecks In Cyber-Physical-Social-Thinking Space
Amar Khelloufi, Huansheng Ning, Sahraoui Dhelim, Jianguo Ding
https://arxiv.org/abs/2506.22487
V2X Intention Sharing for Cooperative Electrically Power-Assisted Cycles
Felipe Valle Quiroz, Johan Elfing, Joel P{\aa}lsson, Elena Haller, Oscar Amador Molina
https://arxiv.org/abs/2506.22223
SYK model based $\beta$ regime dependent two-qubit dynamical wormhole-inspired teleportation protocol simulation
Sudhanva Joshi, Sunil Kumar Mishra
https://arxiv.org/abs/2506.15373
MULTISS: un protocole de stockage confidentiel {\`a} long terme sur plusieurs r{\'e}seaux QKD
Thomas Pr\'evost (I3S), Olivier Alibart (INPHYNI), Marc Kaplan, Anne Marin
https://arxiv.org/abs/2506.04800
Hybrid Stabilization Protocol for Cross-Chain Digital Assets Using Adaptor Signatures and AI-Driven Arbitrage
Shengwei You, Andrey Kuehlkamp, Jarek Nabrzyski
https://arxiv.org/abs/2506.05708