A new way of working with Protocol Buffers. Buf The buf CLI is a tool for working with Protocol Buffers. The ability to manage Protobuf assets on the Buf Schema Registry (BSR). A linter that enforces good API design choices and structure. A breaking change detector that enforces compatibility at the source code or wire level. A generator that invokes your plugins based on configurable templates. A formatter that formats your Protobuf files in accordance with industry standards. Integrat…
Extend existing LLMs way beyond the original training length with constant memory usage, and without retrainingAttention Sinks in Transformers for endless fluent generation TL;DR: attention_sinks adapts pre-trained LLMs to use a modified form of sliding window attention that remains able to produce fluent text indefinitely. See here text generated by the same Llama 2 7B model using the same settings, but loaded using: transformers: Loses fluency after ~1900 tokens and starts endlessly generati…
A Pythonic framework to simplify AI service building LeptonAI python library A Pythonic framework to simplify AI service building Homepage • API Playground • Examples • Documentation • CLI References • Twitter • Blog The LeptonAI python library allows you to build an AI service from python code with ease. Key features include: A pythonic abstraction Photon, allowing you to convert research and modeling code into a service with a few lines of code. Simple abstractions to launch models like thos…
Source code of Ferrocene Ferrocene is a toolchain to enable the use of the Rust programming language in safety-critical environments. It is a proper downstream of the main Rust compiler - rustc, maintained by the Rust project on rust-lang/rust. The mission of Ferrocene is to bring open source practices to safety-critical industries and improve the Rust open source ecosystem through safety-critical practices. Ferrocene is maintained and supported by the world-renowed experts at Ferrous…
PoC for CVE-2023-4911PoC of CVE-2023-4911 "Looney Tunables" This is a PoC of CVE-2023-4911 (a.k.a. "Looney Tunables") exploiting a bug in glibc dynamic loader's GLIBC_TUNABLES environment variable parsing function parse_tunables(). Code has been tested on Ubuntu 22.04.3 with glibc version 2.35-0ubuntu3.3. No attempts have been made to generalize the PoC (read: "Works On My Machine"), so your mileage may vary. As always, big kudos to the Qualys Threat Research Unit fo…
JVector: the most advanced embedded vector search engineJVector JVector is a pure Java, zero dependency, embedded vector search engine, used by DataStax Astra DB and (soon) Apache Cassandra. What is JVector? Algorithmic-fast. JVector uses state of the art graph algorithms inspired by DiskANN and related research that offer high recall and low latency. Implementation-fast. JVector uses the Panama SIMD API to accelerate index build and queries. Memory efficient. JVector compresses vectors using …
Новая Linux-уязвимость, получившая название Looney Tunables (CVE-2023-4911), позволяет локальному злоумышленнику получить root-привилегии, используя переполнение буфера в динамическом загрузчике ld.so библиотеки GNU C. Проблема представляет угрозу практически для всех основных дистрибутивов Linux, включая Fedora, Ubuntu, Debian и так далее.
Для подписчиковПо статистике значительная часть заражений малварью происходит из‑за того, что пользователь сам запустил на своей машине вредоносный файл. Именно в этом и заключается основная задача злоумышленников, использующих социальную инженерию. Давай посмотрим, какие технические уловки и хитрости они применяют.
Компания Sony уведомила нынешних и бывших сотрудников (а также членов их семей) о кибератаке, в результате которой была раскрыта их личная информация. Также в компании подтвердили, что утечка произошла в результате атаки на 0-day уязвимость в MOVEit Transfer.