Tootfinder

Opt-in global Mastodon full text search. Join the index!

@jtk@infosec.exchange
2025-11-15 11:12:12

Curious what the thinking is for an edu to slice off a /24 that ended up at a Bulgarian web hoster.
social.bgp.tools/@transfers/st

@Techmeme@techhub.social
2026-01-06 00:45:34

Nvidia announces the Alpamayo family of AI models, tools, and datasets for AVs, and details a collaboration with Mercedes-Benz on its first full-stack AV effort (Larry Dignan/Constellation Research)
constellationr.com/blog-news/i

@petaqui@masto.es
2026-01-12 13:19:33

@… hi Elena! I'm digging deeper into self hosting (I've been doing that for more than 15 years on simple sites, image hosting, and some tools at a web server), but, I'm thinking of using more complex apps. The point, on why I'm writing to you 😃 aren't you afraid of the security side? Thousands of sites are being hacked daily, aren't you afra…

@andycarolan@social.lol
2025-10-30 07:11:15

Morning!
I don't really know entirely what I am looking for, so I will explain in it the best way that I can...
Does anyone here know of any Autism specific resources for productivity 'hacks'?
I'm thinking of Apps/Sites/Tools for Apple devices mainly.
#Autism #Productivity

@StephenRees@mas.to
2025-11-28 17:24:45

From The Conversation
Canada’s long history with public service media offers a useful model for thinking about how AI could serve the public.
A publicly funded AI system could draw on public-domain materials, government datasets and openly licensed cultural content. It could be offered as an open-source system, making it widely available to researchers, developers and everyday users alike.

The inside of a computer with the central part carrying a symbolic AI
 
Demand for AI is high, but enforcement tools to make sure it respects privacy and data rights remain scarce. Policymakers are caught between encouraging innovation and preventing corporate interests from defining AI. (Getty Images/Unsplash+)
@azonenberg@ioc.exchange
2025-11-26 10:02:34

Is anyone are of good tools for "the attacker knows the key but not the system" cryptanalysis?
I'm thinking scenarios like "I've dumped external flash and efuses off a target with encrypted firmware, but I don't know the algorithm or image format".
So ciphertext and key are believed to be known, but bit ordering, endianness, algorithm, headers, etc are unknown.