Tagged articles
30 articles
Page 1 of 1
Machine Heart
Machine Heart
Apr 30, 2026 · Artificial Intelligence

Can a Pre‑1930 Language Model Infer Einstein’s Relativity? Insights from the Talkie‑1930 Project

Researchers built a 13‑billion‑parameter model trained only on texts published before 1931, called Talkie‑1930, and used surprise‑based metrics, programming tests, and a modern‑twin comparison to explore how far such a historically‑constrained model can extrapolate future knowledge and reveal data‑leakage challenges.

AI researchHumanEvaldata leakage
0 likes · 10 min read
Can a Pre‑1930 Language Model Infer Einstein’s Relativity? Insights from the Talkie‑1930 Project
Black & White Path
Black & White Path
Mar 31, 2026 · Information Security

DeepSeek’s Early‑Year Security Fallout: A Post‑Mortem

The article dissects DeepSeek’s series of security breaches in early 2025—including an open ClickHouse database, multiple XSS flaws, model‑level attacks, and regulatory fallout—highlighting how rapid AI product rollout can outpace essential security safeguards.

AI securityClickHouse exposureDeepSeek
0 likes · 14 min read
DeepSeek’s Early‑Year Security Fallout: A Post‑Mortem
Digital Planet
Digital Planet
Mar 27, 2026 · Information Security

How to Stop QR Code Data Leaks in FMCG Marketing: A Technical Playbook

This article analyzes the systemic risks of QR code package leakage in fast‑moving consumer goods marketing, breaks down the four‑stage code lifecycle, identifies three critical vulnerability points, and presents a five‑layer security framework—including authorization, encryption, expiration, real‑time risk monitoring, and full‑traceability—to protect digital identity assets.

FMCGIdentity PlatformQR code security
0 likes · 12 min read
How to Stop QR Code Data Leaks in FMCG Marketing: A Technical Playbook
SuanNi
SuanNi
Mar 25, 2026 · Artificial Intelligence

How to Evaluate, Optimize, and Secure Retrieval‑Augmented Generation (RAG) Pipelines

This article explains the evaluation pillar of context engineering, introduces the three core RAG metrics (context relevance, faithfulness, answer relevance), details the RAGAS automated assessment framework, shows how to build evaluation datasets, adopt evaluation‑driven development, and protect RAG systems from prompt injection and data leakage.

LLMRAGRAGAS
0 likes · 13 min read
How to Evaluate, Optimize, and Secure Retrieval‑Augmented Generation (RAG) Pipelines
Black & White Path
Black & White Path
Mar 12, 2026 · Information Security

When 1 Billion IDs Leak: Inside the Biggest Identity Verification Breach Ever

A leading identity verification provider exposed over one billion personal records after a cloud storage bucket was misconfigured, revealing names, IDs, biometric data and more; the breach impacted finance, e‑commerce, government and social platforms, prompting analysis of technical and managerial failures and a set of remediation steps for individuals, enterprises and the industry.

KYC securityZero Trustcloud misconfiguration
0 likes · 10 min read
When 1 Billion IDs Leak: Inside the Biggest Identity Verification Breach Ever
IT Services Circle
IT Services Circle
Sep 14, 2025 · Information Security

When a Girlfriend’s Social Post Leads to a Tech Giant’s Dismissal: Lessons on Information Security

A Shenzhen tech employee was fired after his girlfriend posted his badge and 3‑million‑yuan salary online, sparking a debate about strict corporate data protection, internal reporting mechanisms, and the broader responsibilities of both companies and individuals in safeguarding sensitive information.

Tech Industrycorporate policydata leakage
0 likes · 4 min read
When a Girlfriend’s Social Post Leads to a Tech Giant’s Dismissal: Lessons on Information Security
21CTO
21CTO
Mar 10, 2025 · Information Security

Malicious Ads Hijack GitHub and Phone‑Cleaning Apps Leak Your Data

Microsoft uncovered a malicious ad campaign that used pirated streaming sites and multi‑layer redirects to deliver GitHub‑hosted malware, while a separate Surfshark report revealed popular phone‑cleaning apps secretly sharing extensive user data with hundreds of third‑party partners.

Ad FraudGitHubdata leakage
0 likes · 4 min read
Malicious Ads Hijack GitHub and Phone‑Cleaning Apps Leak Your Data
Efficient Ops
Efficient Ops
Feb 20, 2025 · Information Security

How a Maintenance Staff Leak Exposed Security Gaps and How to Prevent It

A recent case where a maintenance worker exploited device‑management flaws to steal confidential files for foreign spies highlights the need for heightened vigilance, strict self‑discipline, and prompt reporting, offering practical steps to safeguard against similar security breaches.

data leakageincident responseinformation security
0 likes · 4 min read
How a Maintenance Staff Leak Exposed Security Gaps and How to Prevent It
DataFunTalk
DataFunTalk
Dec 12, 2023 · Artificial Intelligence

Challenges and Considerations of Recommendation Systems: Evaluation, Data Leakage, and the Role of Large Models

This article examines recommendation system problem definitions, differences between academia and industry, offline evaluation pitfalls and data leakage issues, data construction challenges with datasets like MovieLens, and evaluates whether large language models can serve as effective solutions for modern recommendation tasks.

Recommendation Systemsdata leakagelarge language models
0 likes · 20 min read
Challenges and Considerations of Recommendation Systems: Evaluation, Data Leakage, and the Role of Large Models
DataFunSummit
DataFunSummit
Oct 23, 2023 · Artificial Intelligence

Large Models in Recommendation Systems: Evaluation Challenges, Data Leakage, and Practical Considerations

This article examines how large language models fit into recommendation systems by discussing problem definitions, offline evaluation pitfalls such as data leakage, dataset construction issues exemplified by MovieLens, and the practical limits of using LLMs as a universal solution.

MovieLensRecommendation Systemsdata leakage
0 likes · 18 min read
Large Models in Recommendation Systems: Evaluation Challenges, Data Leakage, and Practical Considerations
DataFunSummit
DataFunSummit
Feb 14, 2023 · Information Security

Digital Watermarking Techniques for Data Leakage Traceability and Protection

This article presents a comprehensive overview of digital watermarking, covering its history, evaluation metrics, various media implementations, challenges posed by AI, and practical applications—especially in e‑commerce—to protect data throughout its lifecycle and enable effective leakage tracing.

Steganographydata leakagedatabase watermark
0 likes · 16 min read
Digital Watermarking Techniques for Data Leakage Traceability and Protection
IT Services Circle
IT Services Circle
Mar 31, 2022 · Information Security

Mobile Browsers Read Clipboard Data and Expose Plaintext Passwords, CCTV Report Shows

A CCTV investigation revealed that some mobile browsers and integrated third‑party SDKs silently read users’ clipboard, capturing bank account numbers, passwords and other personal data in plaintext even when running in the background, highlighting serious privacy risks under China’s Personal Information Protection Law.

CCTVMobile Securityclipboard
0 likes · 3 min read
Mobile Browsers Read Clipboard Data and Expose Plaintext Passwords, CCTV Report Shows
DataFunSummit
DataFunSummit
Jan 18, 2022 · Information Security

Digital Watermarking for Data Leakage Traceability: Techniques, Applications, and Challenges

The article explores the rapid growth of China's digital economy, the escalating risk of data leaks, and how digital watermarking—across images, text, and databases—can be employed to trace leakage sources, protect e‑commerce data, and address practical challenges in security implementations.

data leakagedatabase watermarkdigital watermarking
0 likes · 15 min read
Digital Watermarking for Data Leakage Traceability: Techniques, Applications, and Challenges
Baobao Algorithm Notes
Baobao Algorithm Notes
Dec 12, 2021 · Artificial Intelligence

Why the AAAI22 Re‑ID Paper Leaks Data and a Simpler Alternative Beats It

The author examines the AAAI 2022 paper “Mind Your Clever Neighbours,” reveals that it exploits a data‑leak in unsupervised person re‑identification, critiques the unnecessary Graph Correlation Learning step, and demonstrates a much simpler averaging method that yields superior results.

Unsupervised Learningdata leakagegraph correlation learning
0 likes · 6 min read
Why the AAAI22 Re‑ID Paper Leaks Data and a Simpler Alternative Beats It
Java Architect Essentials
Java Architect Essentials
Dec 11, 2021 · Information Security

Protecting Mobile Privacy in the Big Data Era: Risks of Data Leakage and How to Stay Safe

In today's big‑data era, excessive stress leads many to seek relief through risky online activities, but unauthorized app permissions and visits to dubious sites can expose personal information, so users must stay vigilant, limit permissions, avoid harmful sites, and use security tools to protect their mobile privacy.

Big DataMobile Securitydata leakage
0 likes · 6 min read
Protecting Mobile Privacy in the Big Data Era: Risks of Data Leakage and How to Stay Safe
21CTO
21CTO
Apr 24, 2020 · Artificial Intelligence

Why Your Recommendation System’s Offline Gains Fail Online: Common Pitfalls

This article examines the frequent pitfalls of recommendation systems—misleading metrics, over‑optimizing precision, data leakage, feature inconsistencies, and distribution bias—that cause offline AUC improvements to translate into lower online CTR and CPM, and offers practical mitigation strategies.

AIExploitationMetrics
0 likes · 15 min read
Why Your Recommendation System’s Offline Gains Fail Online: Common Pitfalls
DataFunTalk
DataFunTalk
Apr 24, 2020 · Artificial Intelligence

Common Pitfalls in Recommendation Systems: Metrics, Exploration‑Exploitation, and Offline‑Online Discrepancies

The article surveys typical challenges in recommendation systems, including ambiguous evaluation metrics, the trade‑off between precise algorithms and user experience, the exploration‑exploitation dilemma, and why offline AUC improvements often lead to online CTR/CPM drops due to data leakage, feature inconsistency, and distribution shifts.

AUCCTRExploration-Exploitation
0 likes · 14 min read
Common Pitfalls in Recommendation Systems: Metrics, Exploration‑Exploitation, and Offline‑Online Discrepancies
Liangxu Linux
Liangxu Linux
Oct 21, 2019 · Information Security

How Everything’s HTTP Server Exposes Your Files and How to Secure It

The popular Windows file‑search tool Everything includes an HTTP server that, when left unsecured, lets anyone who knows your IP and port browse and download every file on your computer, exposing personal data that can even be indexed by search engines, but simple configuration changes can close the leak.

File SearchHTTP serverdata leakage
0 likes · 7 min read
How Everything’s HTTP Server Exposes Your Files and How to Secure It
Tencent Cloud Developer
Tencent Cloud Developer
Jul 1, 2019 · Information Security

How to Detect and Prevent Cloud Data Leaks: Practical Strategies and Rule Configurations

This guide explains recent cloud‑based data‑leak incidents, categorizes common leak vectors, analyzes technical and managerial root causes, and provides actionable monitoring techniques, rule‑configuration examples, and incident‑response steps using Tencent Cloud Security Operations Center.

GitHubSecurity OperationsTencent Cloud
0 likes · 19 min read
How to Detect and Prevent Cloud Data Leaks: Practical Strategies and Rule Configurations
Tencent Advertising Technology
Tencent Advertising Technology
Jun 25, 2017 · Artificial Intelligence

Interview with ‘拔萝卜’: Lessons Learned from the Tencent Social Ads Algorithm Competition

In this interview, a solo female participant from Shanghai Jiao Tong University shares her experience, challenges, and technical insights—including feature engineering, memory management, and model tuning with XGBoost and LightGBM—gained while competing in the Tencent Social Ads algorithm contest.

Model tuningTencentXGBoost
0 likes · 5 min read
Interview with ‘拔萝卜’: Lessons Learned from the Tencent Social Ads Algorithm Competition