Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
How we avoided side-channels in our new post-quantum Go cryptography libraries
(
trailofbits.com
)
2 points
by
tob_scott_a
16 hours ago
|
past
|
discuss
We found cryptography bugs in the elliptic library using Wycheproof
(
trailofbits.com
)
5 points
by
ingve
22 hours ago
|
past
|
discuss
How we avoided side-channels in our new post-quantum Go cryptography libraries
(
trailofbits.com
)
2 points
by
ingve
3 days ago
|
past
|
discuss
How we avoided side-channels in our new post-quantum Go cryptography libraries
(
trailofbits.com
)
4 points
by
CiPHPerCoder
4 days ago
|
past
|
discuss
Use mutation testing to find the bugs your tests don't catch
(
trailofbits.com
)
4 points
by
crescit_eundo
12 days ago
|
past
|
discuss
Supply chain attacks are exploiting our assumptions
(
trailofbits.com
)
81 points
by
crescit_eundo
12 days ago
|
past
|
52 comments
The cryptography behind electronic passports
(
trailofbits.com
)
200 points
by
tatersolid
18 days ago
|
past
|
122 comments
Prompt injection to RCE in AI agents
(
trailofbits.com
)
2 points
by
vinhnx
25 days ago
|
past
|
1 comment
Prompt injection to RCE in AI agents
(
trailofbits.com
)
3 points
by
ingve
27 days ago
|
past
OpenVPN2 Security: Taming 2,500 compiler warnings with CodeQL
(
trailofbits.com
)
2 points
by
summarity
54 days ago
|
past
Understanding AddressSanitizer: Better memory safety for your code (2024)
(
trailofbits.com
)
2 points
by
ashvardanian
55 days ago
|
past
Supply chain attacks are exploiting our assumptions
(
trailofbits.com
)
9 points
by
woodruffw
55 days ago
|
past
Subverting code integrity checks to locally backdoor Signal, 1Password and more
(
trailofbits.com
)
2 points
by
elashri
75 days ago
|
past
Subverting code integrity checks to locally backdoor Signal, 1Password, Slack
(
trailofbits.com
)
9 points
by
tatersolid
75 days ago
|
past
Weaponizing image scaling against production AI systems
(
trailofbits.com
)
494 points
by
tatersolid
89 days ago
|
past
|
131 comments
Marshal madness: A brief history of Ruby deserialization exploits
(
trailofbits.com
)
25 points
by
pentestercrab
3 months ago
|
past
|
4 comments
Hijacking multi-agent systems in your PajaMAS
(
trailofbits.com
)
7 points
by
Qwuke
3 months ago
|
past
|
1 comment
MCP servers can attack you before you ever use them
(
trailofbits.com
)
2 points
by
gtirloni
3 months ago
|
past
Trail of Bits' Buttercup wins 2nd place in AIxCC Challenge
(
trailofbits.com
)
2 points
by
wslh
3 months ago
|
past
Buttercup is now open-source
(
trailofbits.com
)
14 points
by
wslh
3 months ago
|
past
Buttercup is now open-source
(
trailofbits.com
)
1 point
by
wrayjustin
3 months ago
|
past
Prompt injection engineering for attackers: Exploiting GitHub Copilot
(
trailofbits.com
)
11 points
by
agentictime
3 months ago
|
past
|
1 comment
Buttercup is now open-source
(
trailofbits.com
)
15 points
by
wglb
3 months ago
|
past
GitHub Copilot Agent prompt injection via Issues
(
trailofbits.com
)
2 points
by
feliperalmeida
3 months ago
|
past
Memory corruption in Nvidia Triton (as a new hire)
(
trailofbits.com
)
2 points
by
ingve
3 months ago
|
past
Hijacking multi-agent systems in your PajaMAS
(
trailofbits.com
)
2 points
by
frabert
3 months ago
|
past
|
1 comment
We built the security layer MCP always needed
(
trailofbits.com
)
3 points
by
wslh
3 months ago
|
past
Exploiting zero days in abandoned hardware
(
trailofbits.com
)
113 points
by
ingve
3 months ago
|
past
|
35 comments
Detecting code copying at scale with Vendetect
(
trailofbits.com
)
2 points
by
gpi
3 months ago
|
past
Detecting code copying at scale with Vendetect
(
trailofbits.com
)
2 points
by
ingve
4 months ago
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: