RSS

Com­puter Se­cu­rity & Cryptography

Tag

Se­cu­rity Mind­set and Or­di­nary Paranoia

Eliezer Yudkowsky25 Nov 2017 17:53 UTC
88 points
23 comments29 min readLW link

On De­stroy­ing the World

Chris_Leong28 Sep 2020 7:38 UTC
75 points
86 comments4 min readLW link

Bet­ter Pass­word Peppering

Yoav Ravid24 Aug 2021 10:19 UTC
5 points
9 comments3 min readLW link

Work on Se­cu­rity In­stead of Friendli­ness?

Wei_Dai21 Jul 2012 18:28 UTC
51 points
107 comments2 min readLW link

En­tropy isn’t suffi­cient to mea­sure pass­word strength

benwr17 Jan 2022 6:41 UTC
36 points
32 comments2 min readLW link
(www.benwr.net)

[Question] In soft­ware en­g­ineer­ing, what are the up­per limits of Lan­guage-Based Se­cu­rity?

MakoYass27 Dec 2020 5:50 UTC
13 points
6 comments1 min readLW link

The dan­ger of er­ror descriptions

gistya25 Mar 2021 20:05 UTC
−1 points
2 comments3 min readLW link

Ho­mo­mor­phic en­cryp­tion and Bitcoin

jimrandomh19 May 2011 1:07 UTC
10 points
9 comments1 min readLW link

What is Cryp­to­graph­i­cally Possible

paulfchristiano24 Dec 2010 4:58 UTC
25 points
19 comments5 min readLW link

Cryp­to­graphic Boxes for Un­friendly AI

paulfchristiano18 Dec 2010 8:28 UTC
48 points
162 comments5 min readLW link

Paper re­view: A Cryp­to­graphic Solu­tion to a Game The­o­retic Problem

victorsintnicolaas24 Apr 2021 11:54 UTC
23 points
4 comments6 min readLW link

[Question] Can prefer­ence falsifi­ca­tion be re­duced with Ring Sig­na­tures?

mike_hawke29 Nov 2020 20:53 UTC
13 points
14 comments1 min readLW link

Crypt­anal­y­sis as Episte­mol­ogy? (pag­ing cryp­ton­erds)

SilasBarta6 Apr 2011 19:06 UTC
17 points
42 comments1 min readLW link

[Question] How good is se­cu­rity for LessWrong and the Align­ment Fo­rum?

Quintin Pope4 Oct 2021 22:27 UTC
20 points
4 comments1 min readLW link

Se­cure homes for digi­tal people

paulfchristiano10 Oct 2021 15:50 UTC
149 points
39 comments9 min readLW link
(sideways-view.com)

[Question] Is there a con­ve­nient way to make “sealed” pre­dic­tions?

Daniel Kokotajlo6 May 2022 23:00 UTC
32 points
19 comments1 min readLW link

The Un­bear­able Light­ness of Web Vulnerabilities

aiiixiii29 May 2022 21:13 UTC
29 points
2 comments1 min readLW link
(www.theoreticalstructures.io)

[Question] How much does cy­ber­se­cu­rity re­duce AI risk?

Darmani12 Jun 2022 22:13 UTC
33 points
23 comments1 min readLW link

Crypto-fed Computation

aaguirre13 Jun 2022 21:20 UTC
16 points
7 comments7 min readLW link

Se­cu­rity Mind­set: Les­sons from 20+ years of Soft­ware Se­cu­rity Failures Rele­vant to AGI Alignment

elspood21 Jun 2022 23:55 UTC
294 points
34 comments7 min readLW link

Scry­ing for out­comes where the prob­lem of deep­fakes has been solved

MakoYass15 Apr 2019 4:45 UTC
26 points
10 comments4 min readLW link

Es­ti­mat­ing the con­se­quences of de­vice de­tec­tion tech

Jsevillamol8 Jul 2018 18:25 UTC
27 points
4 comments7 min readLW link

Uniker­nels: No Longer an Aca­demic Exercise

Martin Sustrik23 Oct 2018 11:40 UTC
27 points
1 comment3 min readLW link
(250bpm.com)

On See­ing Through ‘On See­ing Through: A Unified The­ory’: A Unified Theory

gwern15 Jun 2019 18:57 UTC
26 points
0 comments1 min readLW link
(www.gwern.net)

Com­puter se­cu­rity story

Perplexed17 Feb 2011 0:26 UTC
5 points
30 comments1 min readLW link

Se­cu­rity Mind­set and the Lo­gis­tic Suc­cess Curve

Eliezer Yudkowsky26 Nov 2017 15:58 UTC
76 points
48 comments20 min readLW link

Op­ti­mal User-End In­ter­net Se­cu­rity (Or, Ra­tional In­ter­net Brows­ing)

Arkanj3l9 Sep 2011 18:23 UTC
2 points
23 comments1 min readLW link

Neu­ral pro­gram syn­the­sis is a dan­ger­ous technology

syllogism12 Jan 2018 16:19 UTC
9 points
6 comments2 min readLW link

Lat­a­cora might be of in­ter­est to some AI Safety organizations

NunoSempere25 Nov 2021 23:57 UTC
14 points
10 comments1 min readLW link
(www.latacora.com)

[Question] Trans­fer­ring cre­dence with­out trans­fer­ring ev­i­dence?

kh4 Feb 2022 8:11 UTC
11 points
6 comments3 min readLW link
No comments.