eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

242
active users

#computersecurity

2 posts2 participants0 posts today

Finally updated my #profile at speakerinnen.org :awesome:

Are you looking for a #talk, a #workshop or an #interview on the #socialimpact of #digitalization?

On #ai, #sustainability or #ideologies behind digitalization as #cybernetics, #gamification, #longtermism, or #effectivealtruism?

Why the thoughts and theories of those in power heavily influence societies?

Are you looking for a #workshop on how to really interest people in #computersecurity?

Contact me.

And #boost if you like

*Last Call*

I have a #PhD position for UK students, available with myself and @bentnib

This project will be looking at developing new methods for asserting the resilience of existing communicating systems by developing new static analysis methods derived from advanced programming language research.

*Hard Deadline*: Wednesday 16th April 2025

You will belong to @StrathCyber and @mspstrath, as well as gaining access to @spli

strath.ac.uk/studywithus/postg

(Ignore the deadline on the advert)

Please spread the words.

www.strath.ac.ukTowards Type-Driven Assurance of Communicating Systems | University of Strathclyde
Be careful if you are running an #Ollama web server

According to this article if you run Ollama as a web server, meaning you are running an LLM model locally on your server or home computer, but you have a web portal open to it so people in your organization or home can connect to your server and ask the LLM questions, the Ollama web server is apparently full of security holes. The article mentions two problems:

  • It can leave your computer vulnerable to DDoS attacks from the public Internet
  • The push/pull feature for uploading/downloading models is vulnerable to man-in-the-middle attacks (possibly? as is my understanding)

Quoting the article:

the API can be exposed to the public internet; its functions to push, pull, and delete models can put data at risk and unauthenticated users can also bombard models with requests, potentially causing costs for cloud computing resource owners. Existing vulnerabilities within Ollama could also be exploited.

Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News · 7,000 Exposed Ollama APIs Leave DeepSeek AI Models Wide Open to AttackFollow us on Bluesky, Twitter (X) and Facebook at @Hackread
#tech#AI#OpSec