A quick look into into one of the simplest attacks on LLM safety mitigations, revealing large gaps in current approaches from major tech companies.
A discussion of password strength, brute-force attacks, and the physical limits of the universe.
A reference for password length recommendations for various character sets and entropy levels.
··
7 mins
A general introduction to hiding information in plain sight, its uses in the real-world, and how it works in digital mediums.
··
1 min
A brief overview of my background in computer science and mathematics, my personal projects, and my work as a quantitative analyst.