AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
The Second Best Attack on the Paper
"It's like it's remarkably similar to crime and in the way it lays out, right? Because ultimately, there's a single JSON blob," he says. "We can just vary it to trigger a compression at different places and kind of do a byte by byte attack on the previous secret" Fafecon has since put out some fixes to some of the attacks and new releases of their code.