Answering end user security questions is challenging. While large language models (LLMs) like GPT, LLAMA, and Gemini are far from error-free, they have shown promise in answering a variety of questions outside of security. We studied LLM performance in the area of end user security by qualitatively evaluating 3 popular LLMs on 900 systematically collected end user security questions. While LLMs demonstrate broad generalist ``knowledge'' of end user security information, there are patterns of errors and limitations across LLMs consisting of stale and inaccurate answers, and indirect or unresponsive communication styles, all of which impacts the quality of information received. Based on these patterns, we suggest directions for model improvement and recommend user strategies for interacting with LLMs when seeking assistance with security.
The official specification for Betanet, a fully decentralised, censorship-resistant network intended to replace the public Internet. This document details the layers, cryptography, transport mechanisms, and governance of the Betanet protocol.
Git 2.51-rc0 has been released, continuing preparations for Git 3.0 which will default to SHA-256 hashing. This release includes SHA-256 support for gitk and git-gui, matures the reftable ref back-end for potential default use in Git 3.0, and adds userdiff patterns for the R language, among other improvements.
Minarke Is Not A Real Kriegsmarine Enigma But it will allow you to communicate with one. Command line enigma machine emulator. Full M4 compatability, can be used to decode WWII U-boat messages, or send your own.
* **Enigma Touch:** Jürgen Müller’s Enigma replica is now available for order, featuring a unique all-electronic design and a focus on replicating the original user experience. A Google Group has been created for discussion and related activities.
* **PiDP-1:** The PiDP-1 kit is nearing completion and expected to ship at the end of July, with both console and rack-mounted versions available. A Google Group has been launched for the PiDP-1 community.
* **ARPANET Reconstruction:** Lars Brinkhoff has made significant progress in reconstructing the ARPANET, allowing for connections between emulated PDP-10s and modern Linux machines. The project seeks volunteers to expand the network.
* **LGP-30:** Work is underway on a replica of the LGP-30, with a focus on creating an authentic 1950s metal case.
* **PiDP-10 & Software:** Updates on software for the PiDP-8/11, and a note about running the original Micro-Soft BASIC on a PiDP-10.
* **Whirlwind:** Initial planning for a Whirlwind replica is underway.
This blog post details the process of reading data from an NFC passport chip using Linux, including overcoming challenges with cancelled passports and exploring the security implications.
Mathematicians Ben Green and Mehtaab Sawhney have developed a new counting technique for prime numbers, utilizing tools from additive combinatorics like Gowers norms to explore the distribution of primes, specifically those fitting the form p² + 4q².
SWE-agent is an open-source tool that utilizes large language models (LLMs) like GPT-4o and Claude Sonnet 3.5 to autonomously fix bugs in GitHub repositories, solve cybersecurity challenges, and perform complex tasks. It features a mode called EnIGMA for offensive cybersecurity and prioritizes simplicity and adaptability.
This article details a project where an Enigma machine replica was built using modern technologies like custom PCBs and 3D printed parts. The initial build faced issues with mechanical wear on the rotor contacts (pogo pins), leading to a redesign exploring alternative position detection methods like IR sensors, rotary encoders, and Hall-effect sensors to improve reliability.
NIST has chosen HQC as a backup algorithm for post-quantum encryption, providing an additional layer of defense alongside ML-KEM. HQC uses different mathematical principles and is expected to be finalized in 2027.