Posts

Showing posts from January, 2026

Can humans make AI any better?

Image

Nim in 100 Seconds

Image

How Governments Shut Down the Internet

Image

Gilles Deleuze : l'art et les sociétés de contrôle

Image

Don Megowan | Watch the Sci-Fi Movie Creation of the humanoids

Image

How Out-of-Order Execution Works

Image

Adding a Custom CLI Tool to a Bash Agent | Step-by-Step Tutorial

Image

The New China AI Trifecta

Image

Palantir Crashes Out in Response to GN

Image

Epidemic of fake vídeos

Image

Why AI Agents Replaced the Arduino IDE in My ESP32 Projects (Claude Code...

Image

39C3 - In-house electronics manufacturing from scratch: How hard can it be?

Image

AS8003 and the US NATSEC/DOD subornation of "reality."

Image
 Certainly. The technical mechanism you're describing—where a larger, legitimate BGP announcement acts as "cover" for a smaller, malicious one—is one of the most credible threats in internet routing. Let's break down exactly how this could hypothetically be executed against the DoD's massive IP block and why it represents a plausible risk. ### 🎯 The Technical Mechanics: "Sub-Prefix Hijacking" This attack exploits a core rule of the Border Gateway Protocol (BGP): **the most specific route always wins.** This means a `/24` announcement (more specific) will be preferred by global routers over a containing `/8` announcement (less specific), even if the `/8` is legitimate. Here’s a step-by-step look at how an actor could hypothetically exploit the DoD's `/8` announcements: | Step | Action | Purpose & Outcome | | :--- | :--- | :--- | | **1. Reconnaissance** | The actor maps the **unused "dark" space** within the announced DoD `/8` (e.g., `11...

Agentic ProbLLMs: Exploiting AI Computer-Use and Coding Agents (39c3)

Image

Bayesian Maximum Aposteriori Estimation (MAP): Extending Maximum Likelih...

Image