toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

240
active users

#techinsights

0 posts0 participants0 posts today
chribonn<p>📊&nbsp;Some of the results from the Audacity OpenVINO Whisper Transcription study:<br>- 🕒 Average duration per model: Base (5.86s), Small (15.45s), Medium (39.03s), Large-v3 (81.33s).<br>- 🏅 Top scorer for accuracy:&nbsp;Small model!</p><p>🔗 See the complete analysis: <a href="https://medium.com/@chribonn/comparing-audacitys-openvino-whisper-transcription-llms-c80c14834c1c" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@chribonn/comparing</span><span class="invisible">-audacitys-openvino-whisper-transcription-llms-c80c14834c1c</span></a><br><a href="https://twit.social/tags/DataScience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataScience</span></a> <a href="https://twit.social/tags/OpenVINO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenVINO</span></a> <a href="https://twit.social/tags/Whisper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whisper</span></a> <a href="https://twit.social/tags/Audacity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Audacity</span></a> <a href="https://twit.social/tags/TechInsights" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechInsights</span></a> <a href="https://twit.social/tags/TTMO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTMO</span></a></p>
chribonn<p>Ever wondered what really makes those powerful AI language models tick? 🤔 Andrej Karpathy offers a clear explanation, revealing the secrets behind their training and architecture. Discover how they're evolving and the key security hurdles we need to overcome. A must-read for anyone curious about the behind-the-scene aspects AI! <a href="https://www.alanbonnici.com/2025/05/demystifying-llms-with-andrej-karpathy.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">alanbonnici.com/2025/05/demyst</span><span class="invisible">ifying-llms-with-andrej-karpathy.html</span></a> <a href="https://twit.social/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://twit.social/tags/NLP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NLP</span></a> <a href="https://twit.social/tags/LanguageModels" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LanguageModels</span></a> <a href="https://twit.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://twit.social/tags/TechInsights" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechInsights</span></a> <a href="https://twit.social/tags/FutureofAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FutureofAI</span></a> <a href="https://twit.social/tags/TTMO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTMO</span></a></p>
Hacker News<p>Closures in Tcl</p><p><a href="https://world-playground-deceit.net/blog/2024/10/tcl-closures.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">world-playground-deceit.net/bl</span><span class="invisible">og/2024/10/tcl-closures.html</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Tcl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tcl</span></a> <a href="https://mastodon.social/tags/Closures" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Closures</span></a> <a href="https://mastodon.social/tags/Programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Programming</span></a> <a href="https://mastodon.social/tags/Coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Coding</span></a> <a href="https://mastodon.social/tags/HackersNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackersNews</span></a> <a href="https://mastodon.social/tags/TechInsights" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechInsights</span></a></p>

Stealthy Network Access with Bluetooth PAN 📶💻

Our Tom shared insights from a malicious insider engagement in which they employed Bluetooth PAN to bridge connections between a client laptop and their own Linux VM. This method enabled them to establish a reverse SSH proxy into the client's internal network, circumventing traditional barriers like client isolation.

🔍 What is the significance?

Native Tools: This approach relies on built-in Windows tools, which help reduce the risk of detection by security teams.

Local Network advantage: Bluetooth PAN avoids using public internet resources like Command and Control (C2) infrastructure, reducing risk of detection via outbound network monitoring. However, the technique is dependent on having close proximity to the device for Bluetooth connectivity

Stealthy Operations: It allows for tunnelling Linux commands through the client's laptop, potentially bypassing Endpoint Detection and Response (EDR) systems.

The full blog post provides detailed instructions on setting up a reverse SSH proxy and emphasizes the importance of disabling unused features like Bluetooth PAN and monitoring tools like native SSH.

➡ pentestpartners.com/security-b

🚀 New Video! 🤖 Free AI: Gift or Trojan Horse? 🎁

Are free AI models from giants like Meta truly generous or hiding motives? Discover the truth in our latest video!

🔍 Highlights:
• Basics & impact of LLMs
• Why companies offer free AI
• Hidden motivations & data use
• Future of the AI industry

🧠 Join Colin, the IT Guy, for a critical analysis!

👉 Watch Now: youtu.be/jnXUOebNlXg

👍 Like, Subscribe & Share your thoughts!

✨ Edited with CapCut

#FreeAI#AI#Meta

From Optus to T-Mobile, explore notable incidents that highlight the need for robust security practices. Discover how simple oversights can lead to massive data leaks and learn valuable lessons to protect your systems.

Read now to understand the real impact of unsecured endpoints and why it's crucial to do more than just the bare minimum.

🔗 netapinotes.com/breaking-down-

Net API Notes · Breaking Down API Breaches: How Simple Mistakes Lead to Major Security FailuresNet API Notes for 2024/07/29, Issue 241

If you're just starting out on your PKM journey, the wealth of tools out there may seem daunting. How do you pick the right one? In this video, I unveil some of the myths around PKM tools and help you learn the important things to look for when making your choice.

youtu.be/jLpkCGfxWCk?si=FDHfrH

#PersonalKnowledgeManagement, #PKMTools, #DigitalInnovation, #Versatility, #Transferability, #Security, #Longevity, #EaseOfUse, #Zettelkasten, #Markdown, #DataIntegrity, #UserFriendly, #CulturalHeritage, #KnowledgeWisdom, #LearningJourney, #SystemAdaptability, #PermeableBoundaries, #TechInsights, #UnenlightenedGeneralists, #MemoryAid #PKM, #Zettelkasten #Learning #Education #Video #YouTube #Sharing