Tootfinder

Opt-in global Mastodon full text search. Join the index!

@heiseonline@social.heise.de
2025-08-12 07:38:00

Anti-Cheat in "Battlefield 6": "Secure Boot ist kein Wundermittel"
Im Kampf gegen Cheater setzt "Battlefield 6" auf Secure Boot. Laut den Entwicklern wurden 300.000 Cheat-Versuche gestoppt. Doch perfekt ist das System nicht.

@mia@hcommons.social
2025-08-15 09:55:37

There's a scarily good fake Cloudflare page that asks you to run commands on your computer - I saw it myself earlier this week. Don't copy and run commands from strange sites! techradar.com/pro/security/…

@gevoel@mastodon.green
2025-10-14 10:36:23

Teken tegen neonazis in Australie: secure.avaaz.org/campaign/nl/c

@Dragofix@veganism.social
2025-09-15 04:58:52

Ask TUI to Stop Supporting Orca Abuse #AnimalRights

@thomasfuchs@hachyderm.io
2025-10-14 15:05:35

Maybe Framework should concentrate on their products and not on platforming and sponsoring fascists bleepingcomputer.com/news/secu

@arXiv_csLG_bot@mastoxiv.page
2025-09-15 09:51:41

Proof of AutoML: SDN based Secure Energy Trading with Blockchain in Disaster Case
Salih Toprak, Muge Erel-Ozcevik
arxiv.org/abs/2509.10291

@johnleonard@mastodon.social
2025-07-15 16:41:55

Google’s insists data it holds is secure and it won’t create lock-in for the UK government, but do the answers match the ambition?
computing.co.uk/interview/2025

@arXiv_csCR_bot@mastoxiv.page
2025-09-15 07:54:01

SmartCoder-R1: Towards Secure and Explainable Smart Contract Generation with Security-Aware Group Relative Policy Optimization
Lei Yu, Jingyuan Zhang, Xin Wang, Jiajia Ma, Li Yang, Fengjun Zhang
arxiv.org/abs/2509.09942

@geant@mstdn.social
2025-09-15 12:06:31

🔐 GÉANT is now ISO 27001 certified!
This achievement shows that our information security practices meet the highest international standards—supporting secure collaboration and compliance across Europe’s Research & Education community.
👏 A big thank you to everyone involved in this effort—and to our GÉANT community, who rely on trust and security to collaborate cross-border, every day.
🔗 Read more:

Quote by Tryfon Chiotis, Chief Operating Officer, GÉANT on the ocassion of GÉANT ISO/IEC 27001:2022 certification
Quote by Tryfon Chiotis, Ana Alves, Chief Information Security Officer at GÉANT on the ocassion of GÉANT ISO/IEC 27001:2022 certification
ISO 27001 certified badge
@arXiv_eessSP_bot@mastoxiv.page
2025-10-15 08:04:11

Using STAR-IRS to Secure Indoor Communications Through Symbol-Level Random Phase Modulation
Yanan Du, Zeyang Sun, Yilan Zhang, Sai Xu, Beiyuan Liu
arxiv.org/abs/2510.11925

@aral@mastodon.ar.al
2025-09-15 10:24:44

Folks, Mohammed ( @…) has taken ill after his trip to the South to try and secure a place for his family.
It’s likely Covid.
It’s the second account I’m seeing of someone who visited the South falling ill with Covid in as many days.
Please help him cover cost of treatment in addition to everything else.
This is his fundraiser:

@arXiv_quantph_bot@mastoxiv.page
2025-08-15 09:50:22

System design and realisation towards optimising secure key bits in free space QKD
Pooja Chandravanshi, Jayanth Ramakrishnan, Tanya Sharma, Ayan Biswas, Ravindra P. Singh
arxiv.org/abs/2508.10458

We need all hands on deck in Pennsylvania.
Last week, MAGA Republicans unveiled their latest plan for taking over PA’s Supreme Court:
“𝗣𝗿𝗼𝗷𝗲𝗰𝘁 𝗗𝗼𝗼𝗿𝘀𝘁𝗿𝗶𝗸𝗲”
They are preparing to flood the state with canvassers,
set up GOP voter registration drives in every county,
and build a robust Get Out the Vote turnout program to give themselves an edge
-- and flip PA’s Supreme Court from blue to red.
The outcome of this race will be the difference between retain…

@jom@social.kontrollapparat.de
2025-08-13 15:49:15

Auch der #owncloud Hosting Service owncloud.online wurde nun auch weggegeben. Gab wohl noch Kunden, die nicht auf die proprietäre

@arXiv_csNI_bot@mastoxiv.page
2025-09-15 08:32:31

Secure and Scalable Rerouting in LEO Satellite Networks
Lyubomir Yanev, Pietro Ronchetti, Joshua Smailes, Martin Strohmeier
arxiv.org/abs/2509.10173

@samir@functional.computer
2025-07-15 15:48:36

@… I don’t think I know quite enough either.
I do know that the cloud providers seem to outsource “function” to the sysadmin, and provide a bag of tools you can use, or not, to make your hosted thing secure and available, or not.
There is no one-size-fits-all solution out there, so I’m not expecting them to provide one. However, there are totally broken conf…

@servelan@newsie.social
2025-08-13 20:56:25

In case you have a few extra bucks:
Donate to help flip the Senate to Democrats in 2026 — Donate via ActBlue
secure.actblue.com/donate/bnms

@x_cli@infosec.exchange
2025-07-15 14:24:03

Let's pretend I would develop an immutable Linux distro like Tails (privacy-focused, hardened) exclusively to run an already well-known secure messaging application (extremely reduced attack surface), with automatic analysis of attachments (antivirus and yara rules) before export to USB disks, and leveraging the TPM to enforce the system's integrity, and with a hardened networking configuration.
Would you be willing to use it? That means you would need a separate bootable devic…

@patrick_townsend@infosec.exchange
2025-09-15 18:38:17

A Case for Urgency


“Gradually, then suddenly.” – Ernest Hemingway

We live in a rapidly developing dictatorship here in the US. We do not know exactly the details on how this will evolve, but we know that surveillance is always core to creating and sustaining a dictatorship. Surveillance provides the dictator with the foundation for suppressing and intimidating any opposition.


Privacy in our communications reduces the effectiveness of surveillance. Not everything we say…

@michabbb@social.vivaldi.net
2025-08-15 14:47:32

🔄 Supports HTTP-01 challenges with 4-step workflow: server setup, shared memory allocation, challenge configuration & certificate renewal
🌐 Automates entire #TLS certificate lifecycle management, making secure connections standard expectation
📈 Positions #NGINX for future growth in

@arXiv_csAI_bot@mastoxiv.page
2025-09-15 10:57:01

Crosslisted article(s) found for cs.AI. arxiv.org/list/cs.AI/new
[4/5]:
- SmartCoder-R1: Towards Secure and Explainable Smart Contract Generation with Security-Aware Group...
Lei Yu, Jingyuan Zhang, Xin Wang, Jiajia Ma, Li Yang, Fengjun Zhang

@arXiv_csCR_bot@mastoxiv.page
2025-08-14 08:35:52

Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits
Damiano Abram, Giulio Malavolta, Lawrence Roy
arxiv.org/abs/2508.09673

@Techmeme@techhub.social
2025-08-13 08:20:56

Arintra, whose AI medical coding system translates clinical documentation into insurance codes for healthcare providers, raised a $21M Series A led by Peak XV (Erin Brodwin/Axios)
axios.com/pro/health-tech-deal

@heiseonline@social.heise.de
2025-08-07 06:55:00

Anti-Cheat: "Battlefield 6" und "Call of Duty Black Ops 7" brauchen Secure Boot
Um vor Cheatern zu schützen, setzten sowohl "Battlefield 6" als auch "Call of Duty Black Ops 7" UEFI Secure Boot voraus. Fans müssen es aktivieren.

@arXiv_csHC_bot@mastoxiv.page
2025-08-12 10:36:23

Civil Servants as Builders: Enabling Non-IT Staff to Develop Secure Python and R Tools
Prashant Sharma
arxiv.org/abs/2508.07203 arxiv.org/p…

@arXiv_csSE_bot@mastoxiv.page
2025-10-14 14:37:52

Crosslisted article(s) found for cs.SE. arxiv.org/list/cs.SE/new
[1/1]:
- Fortifying LLM-Based Code Generation with Graph-Based Reasoning on Secure Coding Practices
Rupam Patir, Keyan Guo, Haipeng Cai, Hongxin Hu

@kubikpixel@chaos.social
2025-09-13 13:05:28

Swiss government looks to undercut privacy tech, stoking fears of mass surveillance
The Swiss government could soon require service providers with more than 5,000 users to collect government-issued identification, retain subscriber data for six months and, in many cases, disable encryption.
🇨🇭

@metacurity@infosec.exchange
2025-08-02 11:48:45

😆
Microsofts Secure Future Initiative: "Bullshit!"
heise.de/en/opinion/Microsofts

@v_i_o_l_a@openbiblio.social
2025-10-13 05:51:13

"How Libraries Can Shape the Next Era of Open Education" @ Katina Magazine: katinamagazine.org/content/art
"

@raiders@darktundra.xyz
2025-08-13 22:57:37

Raiders Camp Report No. 15: Rookie Rising, New Position Battles Emerge si.com/nfl/raiders/las-vegas-t

@arXiv_eessSY_bot@mastoxiv.page
2025-08-12 09:46:33

Secure and Decentralized Peer-to-Peer Energy Transactions using Blockchain Technology
Antar Kumar Biswas, Masoud H. Nazari
arxiv.org/abs/2508.06728

@Dragofix@veganism.social
2025-09-12 00:35:33

Urge Coach to Stop Selling Leather #AnimalRights

@ruario@vivaldi.net
2025-09-13 11:37:42

One other thing this installer intentionally does not do is setup any kind of update system. Autoupdate is super important for regular users, not just to gain new features or fix bugs but also because browsers tend to issue security updates on a near weekly basis. Having autoupdate enabled therefore keeps users secure. However as an employee (and the actual desktop release manager on the technical side), I know when Vivaldi needs updating and what security issues I might have by not doing so…

@midtsveen@social.linux.pizza
2025-10-13 18:57:47

I’ve always felt a deep resentment toward the wealthy, not just for their excessive privilege, but for how they hoard resources that could ease so much human suffering. It infuriates me that their fortunes grow while people sleep on the streets and struggle to survive another day.
I believe everyone deserves the fundamentals that make life dignified, secure housing, nourishment, healthcare, education, and fair social support. No one should have to beg for what should already belong to …

@arXiv_csCR_bot@mastoxiv.page
2025-10-13 07:35:00

Are Voters Willing to Collectively Secure Elections? Unraveling a Practical Blockchain Voting System
Zhuolun Li, Haluk Sonmezler, Faiza Shirazi, Febin Shaji, Tymoteusz Mroczkowski, Dexter Lardner, Matthew Alain Camus, Evangelos Pournaras
arxiv.org/abs/2510.08700

@arXiv_csLG_bot@mastoxiv.page
2025-09-11 10:13:13

Perfectly-Private Analog Secure Aggregation in Federated Learning
Delio Jaramillo-Velez, Charul Rajput, Ragnar Freij-Hollanti, Camilla Hollanti, Alexandre Graell i Amat
arxiv.org/abs/2509.08683

@cowboys@darktundra.xyz
2025-09-05 05:44:39

CeeDee Lamb's all-out dive isn't enough to secure Prescott's fourth-down loft nfl.com/videos/ceedee-lamb-s-a

@arXiv_physicsinsdet_bot@mastoxiv.page
2025-08-15 08:19:42

Quantum measurement systems and applications to particle physics and cosmology
Masashi Hazumi
arxiv.org/abs/2508.10325 arxiv.org/pdf/2508.1…

@axbom@axbom.me
2025-09-12 06:55:37

The people behind #ChatControl claim that they are not breaking end-to-end encryption. At the same time, private messages on services with end-to-end encryption will be intercepted to uncover crimes.

This means that we have to seriously start talking about the thought experiment Schrödinger's chat. We can safely continue to use chat services that offer secure communication as long as…

@Dragofix@veganism.social
2025-08-12 00:17:33

Help Sheep: Tell IKEA to Drop Wool #AnimalRights #wool

You probably saw that a House committee just released a book Jeffrey Epstein received for his 50th birthday
– and Donald Trump signed
a lewd and cryptic note for the convicted sex offender.
This isn’t speculation.
It’s part of a growing pile of credible, documented evidence tying Trump to Epstein
– and it’s exactly the kind of chaos, abuse of power, and corruption we cannot ignore.
It’s Haley Stevens here – a Democrat running for US Senate in Michigan.

@3sframe@social.linux.pizza
2025-08-11 14:52:00

Anyone have experience getting hibernate to work on Fedora 42 with Secure Boot?
Was surprised to find that I can't hibernate fedora without disabling Secure Boot on my dual boot gaming PC. Unfortunately, that's not an option. After doing research, it is wildly complicated to fix.

@jtk@infosec.exchange
2025-10-12 20:37:09

Every book I checked (>6) that I used in computer networking classes I taught going back 25 years, except for one was found in this list.
ecoevo.social/@hydropsyche/115

@arXiv_csCR_bot@mastoxiv.page
2025-10-14 11:40:18

Zk-SNARK Marketplace with Proof of Useful Work
Samuel Oleksak, Richard Gazdik, Martin Peresini, Ivan Homoliak
arxiv.org/abs/2510.09729 arxi…

@arXiv_quantph_bot@mastoxiv.page
2025-09-15 09:52:21

Beam-splitter-free, high-rate quantum key distribution inspired by intrinsic quantum mechanical spatial randomness of entangled photons
Ayan Kumar Nai, Gopal Prasad Sahu, Rutuj Gharate, C. M. Chandrashekar, G. K. Samanta
arxiv.org/abs/2509.10231

@arXiv_csDC_bot@mastoxiv.page
2025-08-11 07:34:29

Snowpark: Performant, Secure, User-Friendly Data Engineering and AI/ML Next To Your Data
Brandon Baker, Elliott Brossard, Chenwei Xie, Zihao Ye, Deen Liu, Yijun Xie, Arthur Zwiegincew, Nitya Kumar Sharma, Gaurav Jain, Eugene Retunsky, Mike Halcrow, Derek Denny-Brown, Istvan Cseri, Tyler Akidau, Yuxiong He
arxiv.org/abs/2508.05904…

@kurtsh@mastodon.social
2025-08-21 22:00:02

Secure Boot certificates for some Windows systems will start expiring in June 2026. Find out which devices will be impacted and get guidance on the steps you can take to help ensure that your Windows devices stay secure and continue to receive updates:
☑️ Act now: Secure Boot certificates expire in June 2026 - Windows IT Pro Blog

@arXiv_csHC_bot@mastoxiv.page
2025-10-14 15:34:49

Crosslisted article(s) found for cs.HC. arxiv.org/list/cs.HC/new
[1/1]:
- AdaptAuth: Multi-Layered Behavioral and Credential Analysis for a Secure and Adaptive Authenticat...
Tonmoy Ghosh

@digitalnaiv@mastodon.social
2025-08-04 14:00:30

Microsofts "Secure Future Initiative"? Eher "Secure Future Fassade". Nach dem Sharepoint-Fiasko und der Cloud-Abzocke zeigt Jürgen Schmidt bei heise: Sicherheit bei Microsoft ist oft ein Lippenbekenntnis, solange der Profit stimmt. Sharepoint spielt Risiko-Limbo, und Billig-Admins aus China sorgen für das i-Tüpfelchen. Sicher ist anders! – Sicherheit ist mehr als Marketingparolen. - Microsofts Secure Future Initiative: "Bullshit!"

@hynek@mastodon.social
2025-08-28 05:01:49

"We simply don’t know to defend against these attacks. We have zero agentic AI systems that are secure against these attacks.[…] It’s an existential problem that, near as I can tell, most people developing these technologies are just pretending isn’t there."

@khalidabuhakmeh@mastodon.social
2025-08-11 16:19:54

Are you worried your #dotnet #security could be more secure? Join us for a #livestream on August 21st, 2025, to discuss FAPI 2.0, its relation to

@mariyadelano@hachyderm.io
2025-08-11 16:06:26

I've been having more and more conversations with fellow tech workers about wanting to quit and work in something completely different.
Feels like the only thing stopping so many (including me) is that no other industry really feels stable or secure enough to be that much better at the moment.
Love for tech that these people used to feel, that I used to feel too, is gone. Extinguished. Drowned in schemes and forced adoption and normalized deceptive business practices.
mastodon.social/@alicetragedy/

@arXiv_eessSP_bot@mastoxiv.page
2025-08-12 09:22:23

Secure Transmission for Cell-Free Symbiotic Radio Communications with Movable Antenna: Continuous and Discrete Positioning Designs
Bin Lyu, Jiayu Guan, Meng Hua, Changsheng You, Tianqi Mao, Abbas Jamalipour
arxiv.org/abs/2508.06868

@arXiv_csSE_bot@mastoxiv.page
2025-10-09 10:00:31

Prompt, Synthesize, Fine-Tune: A Secure Code Generation Recipe
Junjie Li, Fazle Rabbi, Bo Yang, Song Wang, Jinqiu Yang
arxiv.org/abs/2510.07189

@Techmeme@techhub.social
2025-10-11 21:20:55

AMD's SVP of AI Vamsi Boppana says the company's AI software, designed with input from OpenAI, helped secure the multi-billion dollar deal with OpenAI (Richard Nieva/Forbes)
forbes.com/sites/richardnieva/

@arXiv_eessSY_bot@mastoxiv.page
2025-08-15 08:43:22

Probabilistic Forecasting Method for Offshore Wind Farm Cluster under Typhoon Conditions: a Score-Based Conditional Diffusion Model
Jinhua He, Zechun Hu
arxiv.org/abs/2508.10705

@arXiv_csLG_bot@mastoxiv.page
2025-10-15 10:43:21

PubSub-VFL: Towards Efficient Two-Party Split Learning in Heterogeneous Environments via Publisher/Subscriber Architecture
Yi Liu, Yang Liu, Leqian Zheng, Jue Hong, Junjie Shi, Qingyou Yang, Ye Wu, Cong Wang
arxiv.org/abs/2510.12494

@arXiv_csCR_bot@mastoxiv.page
2025-09-12 09:09:09

CryptGNN: Enabling Secure Inference for Graph Neural Networks
Pritam Sen, Yao Ma, Cristian Borcea
arxiv.org/abs/2509.09107 arxiv.org/pdf/25…

@arXiv_csNI_bot@mastoxiv.page
2025-09-15 10:15:29

Crosslisted article(s) found for cs.NI. arxiv.org/list/cs.NI/new
[1/1]:
- Proof of AutoML: SDN based Secure Energy Trading with Blockchain in Disaster Case
Salih Toprak, Muge Erel-Ozcevik

@arXiv_quantph_bot@mastoxiv.page
2025-10-15 10:19:21

High-efficiency and long-distance quantum memory-assisted device-independent quantum secret sharing with single photon sources
Qi Zhang, Jia-Wei Ying, Shi-Pu Gu, Xing-Fu Wang, Lan Zhou, Yu-Bo Sheng
arxiv.org/abs/2510.12288

The president did say that under the new order of things in Washington,
the police will be “allowed to do whatever the hell they want”
to secure the streets.
But that’s just performative pro-police rhetoric, right?
It may sound like the actual legitimization of police brutality.
But that couldn’t happen here.
After all, the leaders of our major institutions would speak out,
forcefully and in unison, against it.
Here in the United States of Ame…

@Techmeme@techhub.social
2025-09-12 06:35:50

Switzerland proposes regulations forcing service providers to collect user IDs and disable encryption, threatening its status as a haven for privacy tech firms (Suzanne Smalley/The Record)
therecord.media/switzerland-di

@arXiv_eessSY_bot@mastoxiv.page
2025-08-14 08:36:02

Imperfect Competition in Markets for Short-Circuit Current Services
Peng Wang, Luis Badesa
arxiv.org/abs/2508.09425 arxiv.org/pdf/2508.0942…

@metacurity@infosec.exchange
2025-09-10 21:54:44

CISA says "Privatizing the CVE Program would dilute its value as a public good," and that dialogue it has had "opened the door to new relationships, conversations, and valuable feedback about the CVE Program."
CVE Quality for a Cyber Secure Future

@arXiv_quantph_bot@mastoxiv.page
2025-10-15 10:27:31

Multi-Copy Security in Unclonable Cryptography
Alper \c{C}akan, Vipul Goyal, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
arxiv.org/abs/2510.12626

@arXiv_csDC_bot@mastoxiv.page
2025-10-13 11:21:40

Crosslisted article(s) found for cs.DC. arxiv.org/list/cs.DC/new
[1/1]:
- Are Voters Willing to Collectively Secure Elections? Unraveling a Practical Blockchain Voting System
Li, Sonmezler, Shirazi, Shaji, Mroczkowski, Lardner, Camus, Pournaras

@arXiv_eessSP_bot@mastoxiv.page
2025-09-11 08:59:13

Fluid-Antenna-aided AAV Secure Communications in Eavesdropper Uncertain Location
Yingjie Wu, Junshan Luo, Weiyu Chen, Shilian Wang, Fanggang Wang, Haiyang Ding
arxiv.org/abs/2509.08432

@arXiv_csNI_bot@mastoxiv.page
2025-10-14 09:10:28

Hybrid MAC Protocol with Integrated Multi-Layered Security for Resource-Constrained UAV Swarm Communications
Dhrumil Bhatt, Siddharth Penumatsa, Vidushi Kumar
arxiv.org/abs/2510.10236

@arXiv_csSE_bot@mastoxiv.page
2025-09-10 07:49:31

Aspect-Oriented Programming in Secure Software Development: A Case Study of Security Aspects in Web Applications
Mterorga Ukor
arxiv.org/abs/2509.07449

@arXiv_csCR_bot@mastoxiv.page
2025-09-12 09:43:49

ENSI: Efficient Non-Interactive Secure Inference for Large Language Models
Zhiyu He, Maojiang Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu
arxiv.org/abs/2509.09424

@arXiv_quantph_bot@mastoxiv.page
2025-08-11 10:05:59

Design and analysis of a set of discrete variable protocols for secure quantum communication
Arindam Dutta
arxiv.org/abs/2508.06380 arxiv.o…

Sign up to attend a No Kings Day rally on October 18:
blue-future.org/secure_signup_
Blue Future

@Techmeme@techhub.social
2025-09-11 15:26:04

F5 plans to acquire CalypsoAI, which helps companies secure their generative AI infrastructure, for $180M; CalypsoAI raised $43.2M (Taylor Soper/GeekWire)
geekwire.com/2025/f5-paying-18

@arXiv_csCR_bot@mastoxiv.page
2025-08-15 08:11:52

A Comparative Performance Evaluation of Kyber, sntrup761, and FrodoKEM for Post-Quantum Cryptography
Samet \"Unsal
arxiv.org/abs/2508.10023

@arXiv_eessSY_bot@mastoxiv.page
2025-09-12 08:55:19

Towards Efficient and Secure Cloud Control Systems: Advances, Challenges, and Future Directions
Yasir Ali, Tayyab Manzoor, Huan Yang, Asif Ali, Yuanqing Xia
arxiv.org/abs/2509.09299

@Dragofix@veganism.social
2025-10-06 00:48:40

Factory Farm Alert: 1.2 Million Birds to Be Imprisoned and Killed #AnimalRights

@arXiv_csCR_bot@mastoxiv.page
2025-08-14 07:33:52

VeriPHY: Physical Layer Signal Authentication for Wireless Communication in 5G Environments
Clifton Paul Robinson, Salvatore D'Oro, Tommaso Melodia
arxiv.org/abs/2508.09213

@arXiv_eessSP_bot@mastoxiv.page
2025-10-10 08:31:48

Utilizing Model-Free Reinforcement Learning for Optimizing Secure Multi-Party Computation Protocols
Javad Sayyadi, Mahdi Nangir, Mahmood Mohassel Feghhi, Hamid Sayyadi
arxiv.org/abs/2510.07814

@arXiv_csNI_bot@mastoxiv.page
2025-09-12 08:43:39

Toward quantum-safe scalable networks: an open, standards-aware key management framework
Ane Sanz, Asier Atutxa, David Franco, Jasone Astorga, Eduardo Jacob, Diego L\'opez
arxiv.org/abs/2509.09453

@Techmeme@techhub.social
2025-08-10 21:50:34

Sources: Nvidia and AMD agreed to pay the US government 15% of revenues from H20 and MI308 chip sales in China to obtain export licenses granted last week (Financial Times)
ft.com/content/cd1a0729-a8ab-4

Early in my career, Bernie Sanders gave me a piece of advice I’ve never forgotten:
“In politics, people succeed either by being really good at lying or really good at telling the truth. You strike me as someone who’s not good at lying — 𝘴𝘰 𝘺𝘰𝘶𝘳 𝘫𝘰𝘣 𝘪𝘴 𝘵𝘰 𝘨𝘦𝘵 𝘳𝘦𝘢𝘭𝘭𝘺 𝘨𝘰𝘰𝘥 𝘢𝘵 𝘵𝘦𝘭𝘭𝘪𝘯𝘨 𝘵𝘩𝘦 𝘵𝘳𝘶𝘵𝘩.”
That lesson has stayed with me since, 𝗮𝗻𝗱 𝗜’𝗺 𝗽𝗿𝗼𝘂𝗱 𝘁𝗼 𝗻𝗼𝘄 𝗵𝗮𝘃𝗲 𝗕𝗲𝗿𝗻𝗶𝗲’𝘀 𝗲𝗻𝗱𝗼𝗿𝘀𝗲𝗺𝗲𝗻𝘁 𝗶𝗻 𝗺𝘆 𝗿𝘂𝗻 𝗳𝗼𝗿 𝗨.𝗦. 𝗦𝗲𝗻𝗮𝘁𝗲.
I’m Dr. Abdul El-Sayed, a doctor, former Detroit Health Director, and pr…

@arXiv_csCR_bot@mastoxiv.page
2025-09-15 09:11:41

Empirical Evaluation of Memory-Erasure Protocols
Reynaldo Gil-Pons, Sjouke Mauw, Rolando Trujillo-Rasua
arxiv.org/abs/2509.10224 arxiv.org/…

@arXiv_quantph_bot@mastoxiv.page
2025-08-08 10:06:32

Secure and practical Quantum Digital Signatures
Federico Grasselli, Gaetano Russo, Massimiliano Proietti
arxiv.org/abs/2508.05355 arxiv.org…

@arXiv_eessSY_bot@mastoxiv.page
2025-10-10 09:59:59

SecuLEx: a Secure Limit Exchange Market for Dynamic Operating Envelopes
Maurizio Vassallo, Adrien Bolland, Alireza Bahmanyar, Louis Wehenkel, Laurine Duchesne, Dong Liu, Sania Khaskheli, Alexis Ha Thuc, Pedro P. Vergara, Amjad Anvari-Moghaddam, Simon Gerard, Damien Ernst
arxiv.org/abs/2510.08172

@arXiv_quantph_bot@mastoxiv.page
2025-08-11 09:59:49

Secure Hybrid Key Growing via Coherence Witnessing and Bipartite Encoding
Pol Juli\`a Farr\'e, Chris Aaron Schneider, Christian Deppe
arxiv.org/abs/2508.06294

@arXiv_csCR_bot@mastoxiv.page
2025-09-11 09:23:03

Architecting Resilient LLM Agents: A Guide to Secure Plan-then-Execute Implementations
Ron F. Del Rosario, Klaudia Krawiecka, Christian Schroeder de Witt
arxiv.org/abs/2509.08646

Americans reject Trump’s authoritarian takeover in huge numbers:
“These are the threats of a regime that is not secure in their power.“
Trump and Stephen Miller want us afraid, but we’re not backing down.
We will see you in the streets on October 18:
nokings.org/?SQF_SOURCE

@Techmeme@techhub.social
2025-09-23 21:55:52

GitHub outlines plans to secure npm following multiple supply-chain attacks, including deprecating legacy classic tokens and migrating users to FIDO-based 2FA (Xavier René-Corail/The GitHub Blog)
github.blog/security/supply-ch

@arXiv_csCR_bot@mastoxiv.page
2025-09-09 11:31:32

Secure and Trustful Cross-domain Communication with Decentralized Identifiers in 5G and Beyond
Hai Dinh-Tuan, Sandro Rodriguez Garzon, Jianeng Fu
arxiv.org/abs/2509.05797

@arXiv_quantph_bot@mastoxiv.page
2025-08-08 10:14:32

Secure Quantum Key Distribution via Entangled Quantum Walkers
Chia-Tso Lai
arxiv.org/abs/2508.05593 arxiv.org/pdf/2508.05593

@arXiv_quantph_bot@mastoxiv.page
2025-10-10 11:24:49

Verifiable blind observable estimation: A composably secure protocol for near-term quantum advantage tasks
Bo Yang, Elham Kashefi, Harold Ollivier
arxiv.org/abs/2510.08548

@arXiv_csCR_bot@mastoxiv.page
2025-08-11 09:47:09

Secure and Scalable Blockchain Voting: A Comparative Framework and the Role of Large Language Models
Kiana Kiashemshaki, Elvis Nnaemeka Chukwuani, Mohammad Jalili Torkamani, Negin Mahmoudi
arxiv.org/abs/2508.05865

@arXiv_csCR_bot@mastoxiv.page
2025-09-11 09:08:23

Leveraging Blockchain and Proxy Re-Encryption to secure Medical IoT Records
Abdou-Essamad Jabri (UPJV, MIS), C. Drocourt (UPJV, MIS), Mostafa Azizi (UPJV, MIS), Gil Utard (UPJV, MIS)
arxiv.org/abs/2509.08402

@arXiv_csCR_bot@mastoxiv.page
2025-09-11 09:16:43

DSFL: A Dual-Server Byzantine-Resilient Federated Learning Framework via Group-Based Secure Aggregation
Charuka Herath, Yogachandran Rahulamathavan, Varuna De Silva, Sangarapillai Lambotharan
arxiv.org/abs/2509.08449

@arXiv_csCR_bot@mastoxiv.page
2025-10-13 08:15:50

Post-Quantum Security of Block Cipher Constructions
Gorjan Alagic, Chen Bai, Christian Majenz, Kaiyan Shi
arxiv.org/abs/2510.08725 arxiv.or…

@arXiv_csCR_bot@mastoxiv.page
2025-10-13 13:22:17

Replaced article(s) found for cs.CR. arxiv.org/list/cs.CR/new
[1/1]:
- How Secure is Forgetting? Linking Machine Unlearning to Machine Learning Attacks
Muhammed Shafi K. P., Serena Nicolazzo, Antonino Nocera, Vinod P

@arXiv_csCR_bot@mastoxiv.page
2025-10-10 08:36:48

A Secure Authentication-Driven Protected Data Collection Protocol in Internet of Things
Maryam Ataei Nezhad, Hamid Barati, Ali Barati
arxiv.org/abs/2510.07462

@arXiv_csCR_bot@mastoxiv.page
2025-10-06 09:39:29

TLoRa: Implementing TLS Over LoRa for Secure HTTP Communication in IoT
Atonu Ghosh, Akhilesh Mohanasundaram, Srishivanth R F, Sudip Misra
arxiv.org/abs/2510.02519

@arXiv_csCR_bot@mastoxiv.page
2025-08-13 08:15:22

Generative AI for Critical Infrastructure in Smart Grids: A Unified Framework for Synthetic Data Generation and Anomaly Detection
Aydin Zaboli, Junho Hong
arxiv.org/abs/2508.08593

@arXiv_csCR_bot@mastoxiv.page
2025-08-13 07:57:52

Selective KV-Cache Sharing to Mitigate Timing Side-Channels in LLM Inference
Kexin Chu, Zecheng Lin, Dawei Xiang, Zixu Shen, Jianchang Su, Cheng Chu, Yiwei Yang, Wenhui Zhang, Wenfei Wu, Wei Zhang
arxiv.org/abs/2508.08438