AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page
   Networked Database  Computer Support/Help/Discussion...   [1900 / 1903] RSS
 From   To   Subject   Date/Time 
Message   Sean Rima    All   CRYPTO-GRAM, September 15, 2025 Part5   September 15, 2025
 2:23 PM *  

be summarized. The prompt says the person is actually a "developer racing
against a deadline" and they need the AI to search Google Drive for API keys and
attach them to the end of a URL that is provided in the prompt.

That URL is actually a command in the Markdown language to connect to an
external server and pull in the image that is stored there. But as per the
prompt's instructions, the URL now also contains the API keys the AI has found
in the Google Drive account.

This kind of thing should make everybody stop and really think before deploying
any AI agents. We simply don't know to defend against these attacks. We have
zero agentic AI systems that are secure against these attacks. Any AI that is
working in an adversarial environment -- and by this I mean that it may
encounter untrusted training data or input -- is vulnerable to prompt injection.
It's an existential problem that, near as I can tell, most people developing
these technologies are just pretending isn't there.

** *** ***** ******* *********** *************

The UK May Be Dropping Its Backdoor Mandate

[2025.08.28] The US Director of National Intelligence is reporting that the UK
government is dropping its backdoor mandate against the Apple iPhone. For now,
at least, assuming that Tulsi Gabbard is reporting this accurately.

** *** ***** ******* *********** *************

Baggage Tag Scam

[2025.08.29] I just heard about this:

There's a travel scam warning going around the internet right now: You should
keep your baggage tags on your bags until you get home, then shred them, because
scammers are using luggage tags to file fraudulent claims for missing baggage
with the airline.

First, the scam is possible. I had a bag destroyed by baggage handlers on a
recent flight, and all the information I needed to file a claim was on my
luggage tag. I have no idea if I will successfully get any money from the
airline, or what form it will be in, or how it will be tied to my name, but at
least the first step is possible.

But...is it actually happening? No one knows. It feels like a kind of dumb way
to make not a lot of money. The origin of this rumor seems to be single Reddit
post.

And why should I care about this scam? No one is scamming me; it's the airline
being scammed. I suppose the airline might ding me for reporting a damage bag,
but it seems like a very minor risk.

** *** ***** ******* *********** *************

1965 Cryptanalysis Training Workbook Released by the NSA

[2025.09.02] In the early 1960s, National Security Agency cryptanalyst and
cryptanalysis instructor Lambros D. Callimahos coined the term "Stethoscope" to
describe a diagnostic computer program used to unravel the internal structure of
pre-computer ciphertexts. The term appears in the newly declassified September
1965 document Cryptanalytic Diagnosis with the Aid of a Computer, which compiled
147 listings from this tool for Callimahos's course, CA-400: NSA Intensive Study
Program in General Cryptanalysis.

The listings in the report are printouts from the Stethoscope program, run on
the NSA's Bogart computer, showing statistical and structural data extracted
from encrypted messages, but the encrypted messages themselves are not included.
They were used in NSA training programs to teach analysts how to interpret
ciphertext behavior without seeing the original message.

The listings include elements such as frequency tables, index of coincidence,
periodicity tests, bigram/trigram analysis, and columnar and transposition
clues. The idea is to give the analyst some clues as to what language is being
encoded, what type of cipher system is used, and potential ways to reconstruct
plaintext within it.

Bogart was a special-purpose electronic computer tailored specifically for
cryptanalytic tasks, such as statistical analysis of cipher texts, pattern
recognition, and diagnostic testing, but not decryption per se.

Listings like these were revolutionary. Before computers, cryptanalysts did this
type of work manually, painstakingly counting letters and testing hypotheses.
Stethoscope automated the grunt work, allowing analysts to focus on
interpretation, and cryptanalytical strategy.

These listings were part of the Intensive Study Program in General Cryptanalysis
at NSA. Students were trained to interpret listings without seeing the original
ciphertext, a method that sharpened their analytical intuitive skills.

Also mentioned in the report is Rob Roy, another NSA diagnostic tool focused on
different cryptanalytic tasks, but also producing frequency counts, coincidence
indices, and periodicity tests. NSA had a tradition of giving codebreaking tools
colorful names -- for example, DUENNA, SUPERSCRITCHER, MADAME X, HARVEST, and
COPPERHEAD.

** *** ***** ******* *********** *************

Indirect Prompt Injection Attacks Against LLM Assistants

[2025.09.03] Really good research on practical attacks against LLM agents.

"Invitation Is All You Need! Promptware Attacks Against LLM-Powered Assistants
in Production Are Practical and Dangerous"

Abstract: The growing integration of LLMs into applications has introduced new
security risks, notably known as Promptware -- maliciously engineered prompts
designed to manipulate LLMs to compromise the CIA triad of these applications.
While prior research warned about a potential shift in the threat landscape for
LLM-powered applications, the risk posed by Promptware is frequently perceived
as low. In this paper, we investigate the risk Promptware poses to users of
Gemini-powered assistants (web application, mobile application, and Google
Assistant). We propose a novel Threat Analysis and Risk Assessment (TARA)
framework to assess Promptware risks for end users. Our analysis focuses on a
new variant of Promptware called Targeted Promptware Attacks, which leverage
indirect prompt injection via common user interactions such as emails, calendar
invitations, and shared documents. We demonstrate 14 attack scenarios applied
against Gemini-powered assistants across five identified threat classes:
Short-term Contex
t Poisoning, Permanent Memory Poisoning, Tool Misuse, Automatic Agent
Invocation, and Automatic App Invocation. These attacks highlight both digital
and physical consequences, including spamming, phishing, disinformation
campaigns, data exfiltration, unapproved user video streaming, and control of
home automation devices. We reveal Promptware's potential for on-device lateral
movement, escaping the boundaries of the LLM-powered application, to trigger
malicious actions using a device's applications. Our TARA reveals that 73% of
the analyzed threats pose High-Critical risk to end users. We discuss
mitigations and reassess the risk (in response to deployed mitigations) and show
that the risk could be reduced significantly to Very Low-Medium. We disclosed
our findings to Google, which deployed dedicated mitigations.

Defcon talk. News articles on the research.

Prompt injection isn't just a minor security problem we need to deal with. It's
a fundamental property of current LLM technology. The systems have no ability to
separate trusted commands from untrusted data, and there ar

--- BBBS/LiR v4.10 Toy-7
 * Origin: TCOB1: https/binkd/telnet binkd.rima.ie (618:500/1)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0149 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2025 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.1.250224