<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Reading Log</title>
    <link>https://read.kurtpan.com/</link>
    <description>by &lt;a href=&#34;https://kurtpan.xyz&#34;&gt;Kurt Pan&lt;/a&gt;</description>
    <pubDate>Wed, 06 May 2026 11:13:34 +0000</pubDate>
    <image>
      <url>https://i.snap.as/OjpbNSx6.png</url>
      <title>Reading Log</title>
      <link>https://read.kurtpan.com/</link>
    </image>
    <item>
      <title>The Last Days Of Social Media</title>
      <link>https://read.kurtpan.com/250929?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[The Last Days Of Social Media&#xA;&#xA;  But now, the model is splintering, and users are drifting toward smaller, slower, more private spaces, like group chats, Discord servers and federated microblogs — a billion little gardens.&#xA;&#xA;  While content proliferates, engagement is evaporating.&#xA;&#xA;Repetitive negative thinking is associated with cognitive function decline in older adults: a cross-sectional study&#xA;&#xA;  Psychological problems such as depression and anxiety increase the risk of cognitive impairment in older adults. But mechanisms on the effect of psychological disorder on cognitive function is inconclusive. Repetitive negative thinking (RNT) is a core symptom of a number of common psychological disorders and may be a modifiable process shared by many psychological risk factors that contribute to the development of cognitive impairment. RNT may increase the risk of cognitive impairment.]]&gt;</description>
      <content:encoded><![CDATA[<ul><li><a href="https://www.noemamag.com/the-last-days-of-social-media/">The Last Days Of Social Media</a></li></ul>

<blockquote><p>But now, the model is splintering, and users are drifting toward smaller, slower, more private spaces, like group chats, Discord servers and federated microblogs — a billion little gardens.</p>

<p>While content proliferates, engagement is evaporating.</p></blockquote>
<ul><li><a href="https://bmcpsychiatry.biomedcentral.com/articles/10.1186/s12888-025-06815-2">Repetitive negative thinking is associated with cognitive function decline in older adults: a cross-sectional study</a></li></ul>

<blockquote><p>Psychological problems such as depression and anxiety increase the risk of cognitive impairment in older adults. But mechanisms on the effect of psychological disorder on cognitive function is inconclusive. Repetitive negative thinking (RNT) is a core symptom of a number of common psychological disorders and may be a modifiable process shared by many psychological risk factors that contribute to the development of cognitive impairment. RNT may increase the risk of cognitive impairment.</p></blockquote>
]]></content:encoded>
      <guid>https://read.kurtpan.com/250929</guid>
      <pubDate>Mon, 29 Sep 2025 00:35:00 +0000</pubDate>
    </item>
    <item>
      <title>Many Hard Leetcode Problems are Easy Constraint Problems</title>
      <link>https://read.kurtpan.com/250926?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Many Hard Leetcode Problems are Easy Constraint Problems&#xA;&#xA;  https://www.minizinc.org/&#xA;&#xA;  Lots of similar interview questions are this kind of mathematical optimization problem, where we have to find the maximum or minimum of a function corresponding to constraints. They&#39;re hard in programming languages because programming languages are too low-level. They are also exactly the problems that constraint solvers were designed to solve.&#xA;&#xA;AI Coding&#xA;&#xA;  Most people do not care to find the truth, they care about what pumps their bags. There’s a much bigger market for truths that pump bags vs truths that don’t.&#xA;&#xA;  The best model of a programming AI is a compiler. You give it a prompt, which is “the code”, and it outputs a compiled version of that code. Sometimes you’ll use it interactively, giving updates to the prompt after it has returned code.&#xA;&#xA;  You are still doing the coding, you are just using a different programming language.&#xA;&#xA;  Do the hard work and build better programming languages, compilers, and libraries.]]&gt;</description>
      <content:encoded><![CDATA[<ul><li><a href="https://buttondown.com/hillelwayne/archive/many-hard-leetcode-problems-are-easy-constraint/">Many Hard Leetcode Problems are Easy Constraint Problems</a></li></ul>

<blockquote><p><a href="https://www.minizinc.org/">https://www.minizinc.org/</a></p>

<p>Lots of similar interview questions are this kind of mathematical optimization problem, where we have to find the maximum or minimum of a function corresponding to constraints. They&#39;re hard in programming languages because programming languages are too low-level. They are also exactly the problems that constraint solvers were designed to solve.</p></blockquote>
<ul><li><a href="https://geohot.github.io//blog/jekyll/update/2025/09/12/ai-coding.html">AI Coding</a></li></ul>

<blockquote><p>Most people do not care to find the truth, they care about what pumps their bags. There’s a much bigger market for truths that pump bags vs truths that don’t.</p>

<p>The best model of a programming AI is a compiler. You give it a prompt, which is “the code”, and it outputs a compiled version of that code. Sometimes you’ll use it interactively, giving updates to the prompt after it has returned code.</p>

<p>You are still doing the coding, you are just using a different programming language.</p>

<p>Do the hard work and build better programming languages, compilers, and libraries.</p></blockquote>
]]></content:encoded>
      <guid>https://read.kurtpan.com/250926</guid>
      <pubDate>Fri, 26 Sep 2025 00:00:35 +0000</pubDate>
    </item>
    <item>
      <title>I didn&#39;t bring my son to a museum to look at screens</title>
      <link>https://read.kurtpan.com/250924?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[I didn&#39;t bring my son to a museum to look at screens&#xA;&#xA;  They’re still just video games, where the action-response feedback loop is provided by software, not the universe itself.&#xA;&#xA;  And where it looks like the budget has been going are the screen rooms. They occupy the huge central spaces on the main floor of the museum, and I’m sure a lot of time, money, and passion went into these things. But it’s misguided.&#xA;&#xA;  I believe museums exist to present the real thing for the visitor to experience with their own senses.&#xA;&#xA;  Now more than ever in history, kids need a break from the screens that all too many of them are sadly often plugged into by default, and connection to the real world instead.&#xA;&#xA;The Scam Called “You Don&#39;t Have to Remember Anything”&#xA;&#xA;  We detrain ourselves out of the ability to access the quality of the information and turn it into actual knowledge. So called “digital natives” that they lack the critical and analytical thinking skills to evaluate the information they find on the internet. You need a trained brain to actually benefit from the internet. The advertised benefits of all these tools come with a specific hidden cost: Your ability to think.&#xA;&#xA;  The more you work in a superficial way, the more brittle the knowledge foundation in your mind will be on which you base your cognitive actions.&#xA;&#xA;  If you can’t produce a comprehensive answer with confidence and on the whim the second you read the question, you don’t have the sufficient background knowledge.&#xA;&#xA;  In knowledge work the bottleneck is not the external availability of information. It is the internal bandwidth of processing power which is determined by your innate abilities and the training status of your mind.&#xA;&#xA;  You have to remember EVERYTHING. Only then you can perform the cognitive tasks necessary to perform meaningful knowledge work. We can’t circumvent the work needed to train our minds.]]&gt;</description>
      <content:encoded><![CDATA[<ul><li><a href="https://sethpurcell.com/writing/screens-in-museums/">I didn&#39;t bring my son to a museum to look at screens</a></li></ul>

<blockquote><p>They’re still just video games, where the action-response feedback loop is provided by software, not the universe itself.</p>

<p>And where it looks like the budget has been going are the screen rooms. They occupy the huge central spaces on the main floor of the museum, and I’m sure a lot of time, money, and passion went into these things. But it’s misguided.</p>

<p>I believe museums exist to present the real thing for the visitor to experience with their own senses.</p>

<p>Now more than ever in history, kids need a break from the screens that all too many of them are sadly often plugged into by default, and connection to the real world instead.</p></blockquote>
<ul><li><a href="https://zettelkasten.de/posts/the-scam-called-you-dont-have-to-remember-anything/">The Scam Called “You Don&#39;t Have to Remember Anything”</a></li></ul>

<blockquote><p>We detrain ourselves out of the ability to access the quality of the information and turn it into actual knowledge. So called “digital natives” that they lack the critical and analytical thinking skills to evaluate the information they find on the internet. You need a trained brain to actually benefit from the internet. The advertised benefits of all these tools come with a specific hidden cost: Your ability to think.</p>

<p>The more you work in a superficial way, the more brittle the knowledge foundation in your mind will be on which you base your cognitive actions.</p>

<p>If you can’t produce a comprehensive answer with confidence and on the whim the second you read the question, you don’t have the sufficient background knowledge.</p>

<p>In knowledge work the bottleneck is not the external availability of information. It is the internal bandwidth of processing power which is determined by your innate abilities and the training status of your mind.</p>

<p>You have to remember EVERYTHING. Only then you can perform the cognitive tasks necessary to perform meaningful knowledge work. We can’t circumvent the work needed to train our minds.</p></blockquote>
]]></content:encoded>
      <guid>https://read.kurtpan.com/250924</guid>
      <pubDate>Wed, 24 Sep 2025 00:54:46 +0000</pubDate>
    </item>
    <item>
      <title>Memory Integrity Enforcement: A complete vision for memory safety in Apple...</title>
      <link>https://read.kurtpan.com/250922?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Memory Integrity Enforcement: A complete vision for memory safety in Apple devices&#xA;&#xA;  With the introduction of the iPhone 17 lineup and iPhone Air, we’re excited to deliver Memory Integrity Enforcement: the industry’s first ever, comprehensive, always-on memory-safety protection covering key attack surfaces — including the kernel and over 70 userland processes — built on the Enhanced Memory Tagging Extension (EMTE) and supported by secure typed allocators and tag confidentiality protections.&#xA;&#xA;Analog vs. Digital: The Race Is On To Simulate Our Quantum Universe&#xA;&#xA;  You run out of memory on a classical computer.&#xA;&#xA;  Ringbauer’s team was building a quantum computer that used not qubits but qudits — each with five possible states. The extra possibilities allowed each particle to hold more information, often reducing the number of steps needed for a complex computation.]]&gt;</description>
      <content:encoded><![CDATA[<ul><li><a href="https://security.apple.com/blog/memory-integrity-enforcement/">Memory Integrity Enforcement: A complete vision for memory safety in Apple devices</a></li></ul>

<blockquote><p>With the introduction of the iPhone 17 lineup and iPhone Air, we’re excited to deliver Memory Integrity Enforcement: the industry’s first ever, comprehensive, always-on memory-safety protection covering key attack surfaces — including the kernel and over 70 userland processes — built on the Enhanced Memory Tagging Extension (EMTE) and supported by secure typed allocators and tag confidentiality protections.</p></blockquote>
<ul><li><a href="https://www.quantamagazine.org/analog-vs-digital-the-race-is-on-to-simulate-our-quantum-universe-20250905/">Analog vs. Digital: The Race Is On To Simulate Our Quantum Universe</a></li></ul>

<blockquote><p>You run out of memory on a classical computer.</p>

<p>Ringbauer’s team was building a quantum computer that used not qubits but qudits — each with five possible states. The extra possibilities allowed each particle to hold more information, often reducing the number of steps needed for a complex computation.</p></blockquote>
]]></content:encoded>
      <guid>https://read.kurtpan.com/250922</guid>
      <pubDate>Mon, 22 Sep 2025 00:01:47 +0000</pubDate>
    </item>
    <item>
      <title>[Liquid Glass in the Browser: Refraction with CSS and SVG</title>
      <link>https://read.kurtpan.com/250919?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[[Liquid Glass in the Browser: Refraction with CSS and SVG&#xA;](https://kube.io/blog/liquid-glass-css-svg/)&#xA;&#xA;  Concave surfaces push rays outside the glass; convex surfaces keep them inside.&#xA;&#xA;  A displacement map is simply an image where each pixel&#39;s color tells the browser how far it should find the actual pixel value from its current position.&#xA;&#xA;  This prototype distills Apple’s Liquid Glass into real‑time refraction plus a simple highlight.&#xA;&#xA;Why ML Needs a New Programming Language&#xA;&#xA;  https://www.modular.com/mojo&#xA;&#xA;  Mojo keeps Python&#39;s familiar syntax while adding performance and control. AI people do actually love a thing. It&#39;s called Python.]]&gt;</description>
      <content:encoded><![CDATA[<ul><li><a href="https://kube.io/blog/liquid-glass-css-svg/">Liquid Glass in the Browser: Refraction with CSS and SVG
</a></li></ul>

<blockquote><p>Concave surfaces push rays outside the glass; convex surfaces keep them inside.</p>

<p>A displacement map is simply an image where each pixel&#39;s color tells the browser how far it should find the actual pixel value from its current position.</p>

<p>This prototype distills Apple’s Liquid Glass into real‑time refraction plus a simple highlight.</p></blockquote>
<ul><li><a href="https://signalsandthreads.com/why-ml-needs-a-new-programming-language/">Why ML Needs a New Programming Language</a></li></ul>

<blockquote><p><a href="https://www.modular.com/mojo">https://www.modular.com/mojo</a></p>

<p>Mojo keeps Python&#39;s familiar syntax while adding performance and control. AI people do actually love a thing. It&#39;s called Python.</p></blockquote>
]]></content:encoded>
      <guid>https://read.kurtpan.com/250919</guid>
      <pubDate>Fri, 19 Sep 2025 05:49:12 +0000</pubDate>
    </item>
    <item>
      <title>The story of how RSS beat Microsoft</title>
      <link>https://read.kurtpan.com/250918?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[The story of how RSS beat Microsoft&#xA;&#xA;  RSS entered the game as a humble widget on the experimental My Netscape Network portal.&#xA;&#xA;  All RSS had to do to weather ICE, Twitter, AI, and whatever comes next, was keep things simple and let users build their own feeds, filters, lists, and aggregators. Like email, it probably won’t make anyone a billion dollars or reshape entire industries. But it will always be wholly yours. And if that isn’t nice I don’t know what is.&#xA;&#xA;We all dodged a bullet&#xA;&#xA;  One of the important things to take away from this is that every dependency could be malicious. We should take the time to understand the entire dependency tree of our programs, but we aren&#39;t given that time. At the end of the day, we still have to ship things.]]&gt;</description>
      <content:encoded><![CDATA[<ul><li><a href="https://buttondown.com/blog/rss-vs-ice">The story of how RSS beat Microsoft</a></li></ul>

<blockquote><p>RSS entered the game as a humble widget on the experimental My Netscape Network portal.</p>

<p>All RSS had to do to weather ICE, Twitter, AI, and whatever comes next, was keep things simple and let users build their own feeds, filters, lists, and aggregators. Like email, it probably won’t make anyone a billion dollars or reshape entire industries. But it will always be wholly yours. And if that isn’t nice I don’t know what is.</p></blockquote>
<ul><li><a href="https://xeiaso.net/notes/2025/we-dodged-a-bullet/">We all dodged a bullet</a></li></ul>

<blockquote><p>One of the important things to take away from this is that every dependency could be malicious. We should take the time to understand the entire dependency tree of our programs, but we aren&#39;t given that time. At the end of the day, we still have to ship things.</p></blockquote>
]]></content:encoded>
      <guid>https://read.kurtpan.com/250918</guid>
      <pubDate>Thu, 18 Sep 2025 00:36:03 +0000</pubDate>
    </item>
    <item>
      <title>iPhone dumbphone</title>
      <link>https://read.kurtpan.com/250917?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[iPhone dumbphone&#xA;&#xA;  I used Apple Configurator to turn my iPhone into a dumb phone. I can only access the apps and websites I want to use.&#xA;&#xA;  Using self-control here was like a hunter-gatherer using a club in open battle with a nuclear society. Social media companies spent centuries of human effort figuring out ways to get me to check my phone. If I wanted to win, I would need to use guerrilla methods.&#xA;&#xA;  My phone feels like a utility.&#xA;&#xA;Experimenting with local LLMs on macOS&#xA;&#xA;  I also use them for brain-dumping. I find it hard to keep a journal, because I find it boring, but when you’re pretending to be writing to someone, it’s easier.&#xA;&#xA;  Just avoid asking questions that can’t be easily verified.&#xA;&#xA;  People have secrets and some secrets shouldn’t leave your computer.]]&gt;</description>
      <content:encoded><![CDATA[<ul><li><a href="https://stopa.io/post/297">iPhone dumbphone</a></li></ul>

<blockquote><p>I used Apple Configurator to turn my iPhone into a dumb phone. I can only access the apps and websites I want to use.</p>

<p>Using self-control here was like a hunter-gatherer using a club in open battle with a nuclear society. Social media companies spent centuries of human effort figuring out ways to get me to check my phone. If I wanted to win, I would need to use guerrilla methods.</p>

<p>My phone feels like a utility.</p></blockquote>
<ul><li><a href="https://blog.6nok.org/experimenting-with-local-llms-on-macos/">Experimenting with local LLMs on macOS</a></li></ul>

<blockquote><p>I also use them for brain-dumping. I find it hard to keep a journal, because I find it boring, but when you’re pretending to be writing to someone, it’s easier.</p>

<p>Just avoid asking questions that can’t be easily verified.</p>

<p>People have secrets and some secrets shouldn’t leave your computer.</p></blockquote>
]]></content:encoded>
      <guid>https://read.kurtpan.com/250917</guid>
      <pubDate>Wed, 17 Sep 2025 00:27:23 +0000</pubDate>
    </item>
    <item>
      <title>Chat Control Must Be Stopped, Act Now!</title>
      <link>https://read.kurtpan.com/250916?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Chat Control Must Be Stopped, Act Now!&#xA;&#xA;  &#34;Chat Control&#34; refers to a series of legislative proposals that would make it mandatory for all service providers (text messaging, email, social media, cloud storage, hosting services, etc.) to scan all communications and all files (including end-to-end encrypted ones), in order to supposedly detect whatever the government deems &#34;abusive material.&#34;&#xA;&#xA;  We cannot let authoritarians wear us down until we lose all our privacy rights. Our privacy rights are fundamental to so many other human rights, to civil liberties, to public safety, and to functioning democracies.&#xA;&#xA;No adblocker detected.&#xA;&#xA;  If you want to support your favorite authors: send then money. A dollar helps more then viewing ads ever would.]]&gt;</description>
      <content:encoded><![CDATA[<ul><li><a href="https://www.privacyguides.org/articles/2025/09/08/chat-control-must-be-stopped/">Chat Control Must Be Stopped, Act Now!</a></li></ul>

<blockquote><p>“Chat Control” refers to a series of legislative proposals that would make it mandatory for all service providers (text messaging, email, social media, cloud storage, hosting services, etc.) to scan all communications and all files (including end-to-end encrypted ones), in order to supposedly detect whatever the government deems “abusive material.”</p>

<p>We cannot let authoritarians wear us down until we lose all our privacy rights. Our privacy rights are fundamental to so many other human rights, to civil liberties, to public safety, and to functioning democracies.</p></blockquote>
<ul><li><a href="https://maurycyz.com/misc/ads/">No adblocker detected.</a></li></ul>

<blockquote><p>If you want to support your favorite authors: send then money. A dollar helps more then viewing ads ever would.</p></blockquote>
]]></content:encoded>
      <guid>https://read.kurtpan.com/250916</guid>
      <pubDate>Tue, 16 Sep 2025 00:08:05 +0000</pubDate>
    </item>
    <item>
      <title>Bye Intel, hi AMD! I’m done after 2 dead Intels</title>
      <link>https://read.kurtpan.com/250915?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Bye Intel, hi AMD! I’m done after 2 dead Intels&#xA;&#xA;  Intel’s current CPUs just are not stable. I am giving up on Intel for the coming years and have bought an AMD Ryzen 9950X3D CPU instead. I wanted the fastest AMD CPU (for desktops, not for servers), which currently is the Ryzen 9 9950X, but there is also the Ryzen 9 9950X3D, a variant with 3D V-Cache.&#xA;&#xA;Formatting code should be unnecessary&#xA;&#xA;  Today, we don&#39;t need to worry about hardware-accelerated compilation (hopefully), and we have better tools for refactoring (thanks, Claude). But with formatting, we regressed.&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<ul><li><a href="https://michael.stapelberg.ch/posts/2025-09-07-bye-intel-hi-amd-9950x3d/">Bye Intel, hi AMD! I’m done after 2 dead Intels</a></li></ul>

<blockquote><p>Intel’s current CPUs just are not stable. I am giving up on Intel for the coming years and have bought an AMD Ryzen 9950X3D CPU instead. I wanted the fastest AMD CPU (for desktops, not for servers), which currently is the Ryzen 9 9950X, but there is also the Ryzen 9 9950X3D, a variant with 3D V-Cache.</p></blockquote>
<ul><li><a href="https://maxleiter.com/blog/formatting">Formatting code should be unnecessary</a></li></ul>

<blockquote><p>Today, we don&#39;t need to worry about hardware-accelerated compilation (hopefully), and we have better tools for refactoring (thanks, Claude). But with formatting, we regressed.</p></blockquote>
]]></content:encoded>
      <guid>https://read.kurtpan.com/250915</guid>
      <pubDate>Mon, 15 Sep 2025 00:02:30 +0000</pubDate>
    </item>
    <item>
      <title>I&#39;m Switching to Python and Actually Liking It</title>
      <link>https://read.kurtpan.com/250914?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[I&#39;m Switching to Python and Actually Liking It&#xA;&#xA;  I use uv as my Python package manager and build tool. It’s all I need to install and manage dependencies.&#xA;&#xA;  Ruff combines isort, flake8, autoflake, and similar tools into a single command-line interface.&#xA;&#xA;  ty is a type checker for Python.&#xA;&#xA;  pytest is the most popular testing library for Python.&#xA;&#xA;  Pydantic is a data validation and settings management library for Python.&#xA;&#xA;  I use MkDocs for documentation and static generation of the website for the project.&#xA;&#xA;  I use FastAPI for building APIs.&#xA;&#xA;  Handling dependencies is a pain, but Dependabot makes it easier. It automatically checks for outdated dependencies and creates pull requests to update them.&#xA;&#xA;[Weaponizing image scaling against production AI systems&#xA;](https://blog.trailofbits.com/2025/08/21/weaponizing-image-scaling-against-production-ai-systems/)&#xA;&#xA;  There are three major downscaling algorithms: nearest neighbor interpolation, bilinear interpolation, and bicubic interpolation. Each algorithm requires a different approach to perform an image scaling attack. Furthermore, these algorithms are implemented differently across libraries (e.g., Pillow, PyTorch, OpenCV, TensorFlow), with varying anti-aliasing, alignment, and kernel phases (in addition to distinct bugs that historically have plagued model performance). These differences also impact the techniques necessary for an image scaling attack. Therefore, exploiting production systems required us to fingerprint each system’s algorithm and implementation.]]&gt;</description>
      <content:encoded><![CDATA[<ul><li><a href="https://www.cesarsotovalero.net/blog/i-am-switching-to-python-and-actually-liking-it.html">I&#39;m Switching to Python and Actually Liking It</a></li></ul>

<blockquote><p>I use uv as my Python package manager and build tool. It’s all I need to install and manage dependencies.</p>

<p>Ruff combines isort, flake8, autoflake, and similar tools into a single command-line interface.</p>

<p>ty is a type checker for Python.</p>

<p>pytest is the most popular testing library for Python.</p>

<p>Pydantic is a data validation and settings management library for Python.</p>

<p>I use MkDocs for documentation and static generation of the website for the project.</p>

<p>I use FastAPI for building APIs.</p>

<p>Handling dependencies is a pain, but Dependabot makes it easier. It automatically checks for outdated dependencies and creates pull requests to update them.</p></blockquote>
<ul><li><a href="https://blog.trailofbits.com/2025/08/21/weaponizing-image-scaling-against-production-ai-systems/">Weaponizing image scaling against production AI systems
</a></li></ul>

<blockquote><p>There are three major downscaling algorithms: nearest neighbor interpolation, bilinear interpolation, and bicubic interpolation. Each algorithm requires a different approach to perform an image scaling attack. Furthermore, these algorithms are implemented differently across libraries (e.g., Pillow, PyTorch, OpenCV, TensorFlow), with varying anti-aliasing, alignment, and kernel phases (in addition to distinct bugs that historically have plagued model performance). These differences also impact the techniques necessary for an image scaling attack. Therefore, exploiting production systems required us to fingerprint each system’s algorithm and implementation.</p></blockquote>
]]></content:encoded>
      <guid>https://read.kurtpan.com/250914</guid>
      <pubDate>Sun, 14 Sep 2025 00:57:44 +0000</pubDate>
    </item>
  </channel>
</rss>