본문 바로가기

hacking sorcerer

(386)
Preview of ARM TrustZone TEE and threat model of it ARM TrustZone Architecture : ARM TrustZone, implemented in architectures like ARMv7-A and ARMv8-A, establishes two distinct security domains within the system on chip (SoC) : the secure world and the normal world, with hardware partitioning (Janjua et al., 2018). Each core, memory region, and peripheral in the system is marked as secure or non-secure. The secure world runs the Trusted Execution ..
nano nano miniGPT import torchimport torch.nn as nnimport torch.nn.functional as Fclass SelfAttentionHead(nn.Module): def __init__(self, emb_dim, head_size, block_size): super().__init__() self.key = nn.Linear(emb_dim, head_size, bias=False) self.query = nn.Linear(emb_dim, head_size, bias=False) self.value = nn.Linear(emb_dim, head_size, bias=False) self.register_buffer('tril..
The Silent Override Chapter 1: Shadows in the Wire Night had settled over Greenlake Chemicals like a weighted blanket, smothering the noise of the outside world. The plant sat on the edge of town—out of sight, out of mind—where the concrete walls swallowed the echo of machinery, and the windows, if there were any, never opened. Inside the control room, the air was stale with habit. Gabe slouched in his chair, half-..
military drone hacking Military Drone Hacking Incidents (2022–2025): Case Study and Cybersecurity CountermeasuresIntroduction(UK tech is protecting Ukrainian drones from Russian hackers in real-time - Euromaidan Press) Soldiers training with a quadcopter drone. Modern militaries rely heavily on unmanned aerial vehicles (UAVs), which have become targets for cyber attacks.Unmanned military drones have risen to prominenc..
log_dict.py from collections import defaultdictactivity_logs = {    'neuronet.edu': [(10, 5), (14, 5), (10, 6), (10, 5), (15, 6), (9, 4), (10, 5)],    'cybersys.tech': [(8, 3), (8, 3), (9, 3), (8, 4), (7, 2)],    'quantumhub.ac': [(11, 10), (11, 10), (15, 12), (11, 10), (16, 12)],    'aetherlab.io': [(13, 6), (14, 6), (13, 7), (14, 7), (14, 8), (13, 8)],    'xvoid.org': [(20, 20), (21, 21), (20, 21), (22, 2..
smart_home.py import uuidclass SmartDevice:    def __init__(self, device_id, name, location):        self.id = device_id or str(uuid.uuid4())        self.name = name        self.location = location        self._status = "Inactive"    def get_status(self):        return {            "id": self.id,            "name": self.name,            "location": self.location,            "status": self._status        }    ..
random = security high ? Let's say we build a system architect where every lock, key, and secret passage is generated by high quality randomness. The idea here is profound : when the system is designed by high randomness, it increases unpredictability. Why does it matter ? Because unpredictability prevents attackers to ensure there are no easily discernible patterns to exploit. This unpredictability forms the core idea ..
fake pomodoro DOCTYPE html>html lang="en">head>  meta charset="UTF-8">  meta name="viewport" content="width=device-width, initial-scale=1">  title>Mint Pomodorotitle>  style>    body {      background-color: #121212;      color: #98ff98;      font-family: 'Courier New', Courier, monospace;      display: flex;      justify-content: center;      align-items: center;      height: 100vh;      margin: 0;    }    ...