ReHacked vol. 359: "Made in EU" is hard, Attention Media ≠ Social Networks and more
Support ReHacked newsletter with one time donation. Thank you very much!
"I never looked at the consequences of missing a big shot. Why? Because when you think about the consequences you always think of a negative result." -- Michael Jordan
"Made in EU" - it was harder than I thought. #copyrights #digitalsovereignty
When I decided to build my startup on European infrastructure, I thought it would be a straightforward swap. Ditch AWS, pick some EU providers, done. How hard could it be?
Turns out: harder than expected. Not impossible, I did it, but nobody talks about the weird friction points you hit along the way.
It's already 4 years of active phase of the brutal, devastating and meaningless war. Make a donation - support Ukraine. Щира подяка. Разом до перемоги!
Like what you read? Subscribe now! Please share if you like what you read here, subscribe (if not yet) and leave a comment. Any form of feedback is very important. Thank you very much!
RSS feed available if you don’t want to clutter your inbox.
You can also support ReHacked newsletter with one time donation.
Thank you for being a part of the community. Together, let's continue fostering a culture of knowledge-sharing and making a positive difference in the digital landscape.
I Thought Oversharing Was Career Suicide. Then I Tried It. - WSJ #career #psychology
Oversharing isn’t always wise, but in the right contexts—especially among people who already hold power—revealing something real about yourself can unlock a deeper level of trust. And that night at the conference taught me something counterintuitive about professional credibility: among people who already have status, polish is cheap. Vulnerability is informative.
Attention Media ≠ Social Networks - Susam Pal #internet
First came the infamous infinite scroll. I remember feeling uneasy the first time a web page no longer had a bottom. Logically, I knew very well that everything a browser displays is a virtual construct. There is no physical page. It is just pixels pretending to be one. Still, my brain had learned to treat web pages as objects with a beginning and an end. The sudden disappearance of that end disturbed my sense of ease.
Then came the bogus notifications. What had once been meaningful signals turned into arbitrary prompts. Someone you followed had posted something unremarkable and the platform would surface it as a notification anyway. It didn't matter whether the notification was relevant to me. The notification system stopped serving me and started serving itself. It felt like a violation of an unspoken agreement between users and services. Despite all that, these platforms still remained social in some diluted sense. Yes, the notifications were manipulative, but they were at least about people I actually knew or had chosen to follow. That, too, would change.
CIA World Factbook Archive #internet #resources
36 years of geopolitical intelligence preserved and structured for analysis. Every country, every field, every edition — parsed from the original CIA publications into a searchable, queryable archive.
We hid backdoors in ~40MB binaries and asked AI + Ghidra to find them - Quesma Blog #security #ai #longread
TL;DR
Results
Can AI find backdoors in binaries? Sometimes. Claude Opus 4.6 solved 49% of tasks, while Gemini 3 Pro solved 44% and Claude Opus 4.5 solved 37%.
As of now, it is far from being useful in practice — we would need a much higher detection rate and a much lower false positive rate to make it a viable end-to-end solution.
It works on small binaries and when it sees unexpected patterns. At the same time, it struggles with larger files or when backdoors mimic legitimate access routes.
Binary analysis is no longer just for experts
While end-to-end malware detection is not reliable yet, AI can make it easier for developers to perform initial security audits. A developer without reverse engineering experience can now get a first-pass analysis of a suspicious binary.
A year ago, models couldn’t reliably operate Ghidra. Now they can perform genuine reverse engineering — loading binaries, navigating decompiled code, tracing data flow.
The whole field of working with binaries becomes accessible to a much wider range of software engineers. It opens opportunities not only in security, but also in performing low-level optimization, debugging and reverse engineering hardware, and porting code between architectures.
Back to FreeBSD: Part 1 #software #history #longread
A few decades ago, the only well-known way to deliver something to a server, to make it accessible over the internet, was moving files via FTP in Total Commander, FileZilla or FAR Manager, manually copying files and folders from the left pane to the right one. The more advanced among us preferred standard UNIX tools like scp or rsync instead, but the process was essentially the same.
If you would like to propose any interesting article for the next ReHacked issue, just hit reply or “Leave a comment” link below. It’s a nice way to start a discussion.
Thanks for reading this digest and remember: we can make it better together, just leave your opinion or suggestions after pressing this button above or simply hit the reply in your e-mail and don’t forget - sharing is caring ;) Have a great week!
Dainius
Add a comment: