No More Glass Throughout my career in cybersecurity, I've often heard other practitioners advocate for the idea of a "single pane of glass." While this concept can be valuable in some contexts, it often breaks down when security leaders force the concept onto other teams demonstrating a fundamental misunderstanding
Simulating Personality: Control Vectors + Grammar I was first exposed to the concept of control vectors through Theia Vogel's "Representation Engineering Mistral-7B an Acid Trip". The author does a good job of breaking down the concepts from the Representation Engineering: A Top-Down Approach to AI Transparency so if you haven't
Featured DRINK ME: (Ab)Using a LLM to compress text Introduction Large language models are trained on huge datasets of text to learn the relationships and contexts of words within larger documents. These relationships are what allows the model to generate text. Recently I've read concerns about LLMs being trained on copyrighted text and reproducing it. This got
Security Paralysis Fear is our body's response to a perceived threat. Deeply ingrained in our survival instincts, fundamental to our human nature, it's designed to protect us from harm by prompting a response-- fight, flight, or, as in the case of this topic - freeze. While each of
vulnerability Thousands of Unused WordPress Domains Vulnerable to Takeover There are thousands (Over 14,000 at the time of writing this) of top-level domains which can be used by anyone to host any content they'd like. These domains are pointing to WordPress.com, but don't have an account registered.