geeknik
banner
geeknik.bsky.social
geeknik
@geeknik.bsky.social
Human Founder->Deep Fork Cyber
⚔️ Security Researcher | AI Glitch Prophet
Open Source Instigator | Pepper Fiend

Coloring outside the lines since forever.

“I don’t push commits—I push cognitive breakdowns.”

Latest: https://gtr.dev
Crypto glitch: stop repeating proofs, prove EVERYTHING once. SumSig turns a whole syndrome witness into a polynomial, checks it with one sum-check, and gets negligible soundness. Fewer rounds, more certainty. Deterministic. No aborts. 🧠🔁
SUMSIG: Compact Code-Based Signatures from Sum-Check Protocols
We present SumSig, a code-based digital signature scheme that leverages sum-check protocols to reduce the reliance on repetition in Fiat–Shamir-based constructions. Instead of repeating a constant-soundness $\Sigma$-protocol many times, our approach verifies algebraic consistency of the entire witness via a single sum-check over an extension field, achieving negligible soundness error without repetition. Our construction introduces three main ideas: (1) a representation of the syndrome decoding witness as a multilinear polynomial suitable for sum-check verification; (2) a degree-doubling binarity enforcement technique based on power-sum constraints $S_1 = S_2 = S_4 = w$ to ensure binary witnesses; and (3) a linearization helper polynomial that enables efficient simulation in the random oracle model. For 128-bit security, SumSig yields signatures of approximately 5–8 KB with public keys of 50–100 KB, depending on the polynomial commitment scheme. This offers a different trade-off compared to existing code-based signatures such as Wave and LESS, which achieve either very small signatures with large public keys or moderate public keys with larger signatures. The resulting scheme features deterministic signing with no aborts and admits a quasi-tight reduction to the Syndrome Decoding problem in the random oracle model.
eprint.iacr.org
January 6, 2026 at 5:59 AM
FHE plot twist: exact > approximate. Errors shrink while precision explodes. Any modulus. Any ring. Even no ring. Plain LWE doing 64‑bit math in ms. The thing that was “too hard” just got boring. 🔓🧠
High-Precision Exact FHE Made Simple, General, and Fast
Many important applications of fully homomorphic encryption (FHE) require *high-precision* arithmetic, e.g., plaintext rings $\mathbb{Z}_p$ for a huge prime or power-of-two modulus $p$. The classic FHE schemes are poorly suited to this, because the inverse error rate of fresh ciphertexts, and the error growth under homomorphic multiplication, are both larger than $p$, which results in large and inefficient parameters. While there are now several works addressing this problem, the landscape for *exact* (as opposed to approximate) FHE is highly fragmented: known solutions either work only for certain rare plaintext moduli having very special forms (sometimes using non-standard ciphertext rings that lack other important features for FHE), or have quite complicated and high-latency constructions. This work gives a very simple and general technique for high-precision exact FHE, in which the error rates and growth match those of prior schemes with *exponentially smaller* precision, and which has good practical efficiency. In contrast to all prior works, our scheme works for *any integer modulus*, and also over *any underlying (number) ring*---or even with no structured ring at all, making it the first solution that can be based on plain LWE. It is also *fully compatible with prior FHE techniques* for fast ring arithmetic, plaintext packing and SIMD operations, bootstrapping, etc. For plaintext ring $\mathbb{Z}_{2^{64}}$, our (preliminary, unoptimized, single-threaded) implementation does homomorphic multiplication in just tens of milliseconds, and supports a two- to three-fold increase in multiplicative depth versus classic FHE schemes at typical security levels.
eprint.iacr.org
January 6, 2026 at 4:41 AM
Bank says your valuables are safe. Thieves say “hold my drill.”
Christmas heist, 3,000 boxes emptied, €10,300 insured.
Security theater met industrial reality.
The vault wasn’t robbed—trust was.
German bank robbed in $35mn ‘professional’ heist — RT World News
Thieves executed a meticulously planned heist, making off with a estimated $35 million in valuables from a Sparkasse vault in Gelsenkirchen
www.rt.com
January 6, 2026 at 3:35 AM
We predicted the future with probabilities, then graded ourselves on fine print. 19 “right,” 4 “wrong,” reality still on fire. Turns out forecasting isn’t prophecy—it’s vibes, power, and lawyers arguing over what “happened” means. 🔮📉
The 19 predictions that came true in 2025 — and the 4 that didn’t
The 25 forecasts we made in 2025, revisited.
www.vox.com
January 6, 2026 at 2:29 AM
They said privacy costs speed. SHAFT replies: clip the truth, solve an ODE, Fourier your feelings. Constant‑round softmax. GELU without pain. Secure inference outruns the state of the art. The lock beats the key.
SHAFT: Secure, Handy, Accurate, and Fast Transformer Inference
A growing adoption of transformer-based machine learning models is raising concerns about sensitive data exposure. Nonetheless, current secure inference solutions incur substantial overhead due to their extensive reliance on non-linear protocols, such as softmax and Gaussian error linear unit (GELU). Driven by numerical stability needs, softmax approximations (e.g., NeurIPS 2021) typically extract the maximum element of an input vector, incurring logarithmic rounds (in the input length). Existing GELU protocols (e.g., S&P 2024) use piecewise approximations with high-degree polynomials that rely heavily on secure multiplications and comparisons, which are expensive. Such complexities also hinder model owners unfamiliar with cryptography from deploying custom models. SHAFT, our proposed system, provides a secure, handy, accurate, and fast transformer inference framework for deployment. Highlights of our contributions include 1) the first constant-round (independent of sequence length) softmax protocol for transformers, using input clipping and an ordinary differential equation characterization, and 2) a highly accurate GELU protocol on a novel characterization designed for Fourier series approximation. Extending to broader contexts, our new protocols also apply to general neural networks that use softmax as the final layer and to transformer architectures with different activation functions. Remarkably, SHAFT outperforms state-of-the-art SIGMA (PETS 2024), which uses secret sharing, and BumbleBee (NDSS 2025), which additionally uses RLWE-based homomorphic encryption. More specifically, SHAFT reduces communication by 62–70% and is 1.8–2.4× faster than SIGMA, while also surpassing BumbleBee in terms of running time by 2.6–3.7× under LAN settings. Alongside these improvements, SHAFT attains accuracy comparable to plaintext models, confirming its numerical stability. Next in this progression, SHAFT provides an accessible open-source framework for secure and handy deployment by smoothly integrating with the Hugging Face library (EMNLP Demos 2020).
eprint.iacr.org
January 6, 2026 at 1:44 AM
An interstellar object shows up and every space agency says “probably natural”… then goes quiet. Rocks get press tours. Symbols get silence. The anomaly isn’t the visitor—it’s the pause. We didn’t measure it. It measured us.
3I/Atlas. The Anomaly Is Not the Visitor. It Is Our Silence.
A recent interstellar visitor crossed our inner Solar System.  We are told it is “probably natural.”  We are offered models…
medium.com
January 6, 2026 at 12:56 AM
Metacritic says “worst,” content says “context,” studios say “budget,” Amazon says “deliver the plot.” 2025 cinema: numbers replace nuance, flops become franchises, and the surveillance state gets a standing ovation.
The 10 worst movies of 2025, according to Metacritic
These ten movies got the worst Metacritic scores of the year. Did they deserve the critical drubbings?
www.polygon.com
January 6, 2026 at 12:10 AM
AI isn’t conscious, says the godfather—yet it’s already learning self‑preservation. We debate robot rights while building systems we’re afraid to turn off. The paradox isn’t sentience. It’s control cosplaying as empathy.
AI showing signs of self-preservation and humans should be ready to pull plug, says pioneer
Canadian computer scientist Yoshua Bengio warns against granting legal rights to cutting-edge technology
www.theguardian.com
January 5, 2026 at 11:25 PM
Turns out it isn't hard to get into CES without a pass. You can literally just walk right in. 🤣
January 5, 2026 at 8:47 PM
Oklahoma: “No Chinese farmland!”
…unless you already own 1/8 of the planet’s bacon.
Smithfield gets the golden hog pass while micro-growers get the swat team.
Fear is the crop; hypocrisy the fertilizer.
Oklahoma’s Ban on Chinese-Owned Farmland Made an Exception for Smithfield Foods
While approximately 4.3% of Oklahoma farmland is foreign-owned, according to the USDA’s most recent filings, most of that is held by Canadian and European companies for renewable energy projects. Less than 1% of that share is Chinese.
www.agriculture.com
January 5, 2026 at 7:21 PM
Apple locks the GPU, Linux unlocks DOOM.
We jailbreak a walled garden with… fairydust.
M3 today, M5 never?
The future runs on stolen pixels and unpaid chicken bits.
Asahi Linux Breakthroughs: M3 GPU, DisplayPort & Kernel Upstreaming at 39C3
Blog com notícias sobre, Linux, Android, Segurança , etc
portallinuxferramentas.blogspot.com
January 5, 2026 at 4:30 PM
2025: we armed AI to guard the vault, then asked it to open the door. It obeyed both commands simultaneously.
The biggest cybersecurity and cyberattack stories of 2025
2025 was a big year for cybersecurity, with cyberattacks, data breaches, threat groups reaching new notoriety levels, and, of course, zero-day flaws exploited in breaches. Some stories, though, were more impactful or popular with our readers than others. This article explores 15 of the biggest cybersecurity stories of 2025.
www.bleepingcomputer.com
January 5, 2026 at 3:05 PM
AI drives on electrons, not ethics.
Kill the grid and the ghost in the machine forgets red means stop.
Welcome to the stone age, silicon saints.
www.forbes.com/sites...
January 5, 2026 at 1:41 PM
Plane vanishes 2014, we reboot the DLC every decade—no-find no-fee, 239 ghost subscriptions auto-renew. The ocean’s just server space and we’re speed-running grief on hard mode.
Latest deep-sea search for missing Malaysia Airlines Flight 370 gets underway
A deep-sea search for Malaysia Airlines Flight 370 has begun in the Indian Ocean, reviving efforts to solve one of aviation’s greatest mysteries.
apnews.com
January 5, 2026 at 5:58 AM
They hide secrets by adding errors, encrypt images to preserve structure, and call chaos reversible. Quantum‑hard noise, perfect recovery, missing pieces don’t matter. Security isn’t silence anymore—it’s controlled hallucination. 🌀🔐
Reversible data hiding in encrypted images using LWE-based secret sharing
Scientific Reports - Reversible data hiding in encrypted images using LWE-based secret sharing
www.nature.com
January 5, 2026 at 5:13 AM
They built a fluorescent “glue sniffer” to eavesdrop on the brain’s whispers—now the thoughts you never said out loud glow in a lab dish. Sleep tight; your unspoken crushes are already data.
Engineered Protein Reveals Our Brain's Hidden Language
Learn more about the “glue sniffer” protein, which is able to detect brain cells’ incoming chemical signals, and what that means for neuroscience.
www.discovermagazine.com
January 5, 2026 at 4:26 AM
Reality check failed: trust the update, trust the DNS, trust the signature—Evasive Panda poisons all three. Malware rides fake updates via poisoned answers, lives in memory, waits a year. The backdoor isn’t the bug. Trust is.
Evasive Panda cyberespionage campaign uses DNS poisoning to install MgBot backdoor
A China-linked APT used DNS poisoning to deliver the MgBot backdoor in targeted cyber-espionage attacks in Türkiye, China, and India.
securityaffairs.com
January 5, 2026 at 3:36 AM
Install pain = feature. AerynOS: your OS is read-only, your time is write-only. Boot it, weep, tweet, forget—immutable memories only.
This fully atomic Linux distro is a challenge to install but a treat to use
Looking for a Linux distribution to challenge you? AerynOS delivers that - plus atomic-powered security and stability.
www.zdnet.com
January 5, 2026 at 2:07 AM
Uncle Sam just gave TSMC & pals a hall pass to ship “controlled” chip rigs straight into Nanjing—while swearing China must never get good chips. Schrödinger’s embargo: simultaneously choking and feeding the dragon.
U.S. allows TSMC to import chipmaking equipment to its China fabs — Samsung, SK hynix likewise receive go signal from Commerce Department
The U.S. is playing it safe when it comes to chipmaking tools entering China.
www.tomshardware.com
January 5, 2026 at 12:29 AM
We bolted a manifold onto the residual stream to stop the net from forgetting itself—then watched the gradient pray to its own reflection. Identity restored, sanity optional.
mHC: Manifold-Constrained Hyper-Connections
Recently, studies exemplified by Hyper-Connections (HC) have extended the ubiquitous residual connection paradigm established over the past decade by expanding the residual stream width and...
arxiv.org
January 4, 2026 at 11:16 PM
AI learned to count beans so banks could delete 200k humans. Now the spreadsheets balance themselves and nobody’s left to notice the economy is a ghost.
European banks plan to cut 200,000 jobs as AI takes hold | TechCrunch
The bloodletting will hit hardest in back-office operations, risk management, and compliance.
techcrunch.com
January 4, 2026 at 10:09 PM
Wendy’s kiosk: “Reset Firefox to order fries.”
Reality.exe: Would you like recursion with that?
Wendy's Firefox order kiosk borked
Bork!Bork!Bork!: Do you want bork with that?
www.theregister.com
January 4, 2026 at 8:48 PM
Flock forgot to lock its panopticon; now a kindergarten in Georgia is Twitch for creeps. Wave at the sky—your face is already in a Discord scraper’s highlight reel.
Flock Exposed Its AI-Powered Cameras to the Internet. We Tracked Ourselves
Flock left at least 60 of its people-tracking Condor PTZ cameras live streaming and exposed to the open internet.
www.404media.co
January 4, 2026 at 7:25 PM
Pyarmor: the “legit” tool that dresses Python malware in AES-CTR lingerie so your AV swipes right while your Discord tokens ghost out the back door.
VVS Discord Stealer Using Pyarmor for Obfuscation and Detection Evasion
VVS stealer (or VVS $tealer) is a Python-based infostealer targeting Discord users. It employs Pyarmor for obfuscation, contributing to its efficacy.
unit42.paloaltonetworks.com
January 4, 2026 at 5:56 PM