Machine learning is vulnerable to a wide variety of attacks

machine learning

This paper looks at how threat actors can manipulate and poison machine learning training, to twist the systems to their goals. The goals are achieved without impacting the integrity of the underlying data sets. Manipulating SGD with Data Ordering Attacks (arxiv.org) Shumailov, I., Shumaylov, Z., Kazhdan, D., Zhao, Y., Papernot, …

I wanted to post this last weekend – but it only became available this morning! A Platinum Jubilee Fact.

retro tech

The BBC Inside Science, radio show, went to their archives to look at science and technology over the last 70 years. BBC Inside Science – A Reign of Science – BBC Sounds I was also born in 1961, and it is interesting to listen to the bit about “…back then, …

Encryption and how we got to an internet where you can securely buy things online. A Platinum Jubilee Fact.

Ralph C. Merkle was born on February 2, 1952. He was one of the inventors of public key cryptography – a security methodology that today’s internet and communications rely on heavily. The discovery and publishing dates for public key cryptography gets a bit confusing – I am sure a white …