Skip to main content

Cybersecurity

Injected Approval: A Low Effort Local LLM Jailbreak
A quick look into into one of the simplest attacks on LLM safety mitigations, revealing large gaps in current approaches from major tech companies.
Absurd Password Lengths and the Computational Limits of Humanity
· 7 mins
A discussion of password strength, brute-force attacks, and the physical limits of the universe.
Table of Password Lengths for Various Character Sets and Entropies
· 2 mins
A reference for password length recommendations for various character sets and entropy levels.
Steganography: Hiding Data Inside Data
·· 7 mins
A general introduction to hiding information in plain sight, its uses in the real-world, and how it works in digital mediums.
About me
·· 1 min
A brief overview of my background in computer science and mathematics, my personal projects, and my work as a quantitative analyst.