Articles by jruohonen
2

Hand Paintings and Engravings in Rock Art (bradshawfoundation.com)

1

How Aesop and Jean de la Fontaine help us learn new languages (antipodeanodyssey.wordpress.com)

20

Scientific datasets are riddled with copy-paste errors (sciencedetective.org)

1

How Pants (amacad.org)

1

KV the Apostate (acm.org)

2

A Close Look at a Spinlock (regehr.org)

1

KGB Building and Cells (dark-tourism.com)

2

Tracing the social half-life of a zombie citation (codeactsineducation.wordpress.com)

4

Europol-supported global operation targets over 75 000 users engaged in DDoS (europa.eu)

2

Capture the Narrative: Wargaming Social Media Manipulation (capturethenarrative.com)

2

Stardrop Supply Chain Attack Targets Venture Capital Firms, Luxury Brands (opensourcemalware.com)

2

Fake Linux leader using Slack to con devs into giving up their secrets (theregister.com)

4

Should Men Be Ashamed of Their AI Girlfriends? (apaonline.org)

4

What is the chance of a message in a bottle being found? (theconversation.com)

1

Why Do Computers Stop and What Can Be Done About It? (1985) [pdf] (wisc.edu)

3

Information Management: A Proposal (1989) (repository.cern)

1

The Internet of Poop (columbia.edu)

4

Introducing Project Glasswing (linuxfoundation.org)

1

Refusal to Review (irisvanrooijcogsci.com)

2

Gobo (languagehat.com)

1

Historical Java (2014) (sweharris.org)

1

Scuttlebutt Genesis (handbook.scuttlebutt.nz)

2

The Federal Government Is Rushing Toward AI (propublica.org)

1

On Division by Three (2023) (leahneukirchen.org)

2

Open source was never about trust (opensourcesecurity.io)

1

Update on Platform Stability (hypotheses.org)

1

Understanding Partial Reachability (internetsociety.org)

2

TeamPCP Supply Chain Campaign: Update 007 (sans.edu)

1

The Fast and Spurious: Developer Productivity with GenAI (arxiv.org)

2

Spilling the Neural Tea: A Journey Down the Side-Channel (sigarch.org)

1

"Faking 'realness' on a computer doesn't get us anywhere new." (itsnicethat.com)

1

The Top-10 Threats Related to Agent Skills (akamai.com)

9

Eighteen Years of Greytrapping – Is the Weirdness Finally Paying Off? (nxdomain.no)

1

100 Years of the Iron Ring (engineerscanada.ca)

2

Video Friday: Digit Learns to Dance (ieee.org)

5

EU cyber agency attributes major data breach to TeamPCP hacking group (therecord.media)

2

'Nothing like the Louvre': Italian art museum hit by cyberattack (politico.eu)

2

TeamPCP Supply Chain Campaign: Update 006 (sans.edu)

2

Orange Cats (aceecat.org)

4

US Bans All Foreign-Made Consumer Routers (schneier.com)

3

They thought they were downloading Claude Code source (theregister.com)

3

Incident LiteLLM/Telnyx supply-chain attacks, with guidance (pypi.org)

1

Beyond the Network View: DNS-Driven Application Visibility (ripe.net)

1

Blackouts and Byteouts (internetsociety.org)

2

Declining Global Security (epthinktank.eu)

2

Trusted Publishers for All Package Repositories (openssf.org)

1

Do Not Stick Out (cdt.org)

2

Predatorgate: Breaking the chain of impunity of the spyware underworld (edri.org)

3

TeamPCP Supply Chain Campaign: Update 005 (sans.edu)

3

Claude Code source leak reveals how much info Anthropic can hoover up about you (theregister.com)

1

The potential of erroneous outbound traffic (apnic.net)

3

The AI Industry, Unloved (misalignedmag.com)

1

Quote #75514 (mako.cc)

3

Noyb win: Microsoft ordered to stop tracking school children (noyb.eu)

3

Employers Beware: Uptick in BIPA Lawsuits Targeting AI Note-Taking Software (amundsendavislaw.com)

8

Leaked Memo Suggests Red Hat's Chugging the AI Kool-Aid (theregister.com)

2

EtherHiding: The Trojan in Your Toolchain (cyber.gc.ca)

2

OpenAI Closing Its One-Stop AI Slop Shop Sora Is a Cautionary Tale (techpolicy.press)

1

Using AI Generated Code (mc-stan.org)

1

Pwning NetBSD-Aarch64 (ARM) (feyrer.de)

1

"Learning to Read, Again" (plasmasturm.org)

4

The "scanner report has to be green" trap (ubuntu.com)

3

Axios NPM Package Compromised: Supply Chain Attack Delivers Cross-Platform Rat (snyk.io)

2

"An Endless Stream of AI Slop" (arxiv.org)

2

Small World with High Risks (2019) [pdf] (usenix.org)

3

TeamPCP Supply Chain Campaign: Update 004 (sans.edu)

2

European Commission downplays ShinyHunters cyberattack impact (therecord.media)

2

Vibe check: AI may replace SaaS (but not for a while) (ncsc.gov.uk)

1

Generative AI – Intellectual Property Cases and Policy Tracker (mishcon.com)

2

Senior European journalist suspended for publishing AI-generated quotes (euronews.com)

5

European Commission admits attackers broke into public web systems (theregister.com)

1

In Praise of Plasma TVs (hackaday.com)

1

Credential Broker for Agents (CB4A) (ietf.org)

2

Compromised telnyx on PyPI (safedep.io)

3

Diseconomies of scale in fraud, spam, support, and moderation (danluu.com)

3

A Cautionary Tale from the Decline of SourceForge (neverworkintheory.org)

1

Device-Access Under the Digital Omnibus (law.kuleuven.be)

1

Social Media Addiction Trial Should Lead to Platform Redesigns (ieee.org)

1

114: 98% Free from Arthropod Infestation (mwl.io)

2

Butterfly-collecting: The history of an insult (2017) (lughat.blogspot.com)

2

A Year of Open Source Vulnerability Trends (github.blog)

2

TeamPCP Supply Chain Campaign: Update 002 (sans.edu)

1

Mathematics at Berkeley: A History (2008) [pdf] (math.berkeley.edu)

2

The Slow Evolution of Electronic Publishing (1997) [pdf] (umn.edu)

1

White Landmark in Ancient Landscape (goethe.de)

2

Use of Large Language Models in Standards Work (w3.org)

1

OpenBSD on SGI, 1/6: A missed opportunity (online.fr)

2

70% of new software engineering papers on ArXiv are LLM related (shape-of-code.com)

2

A Cat Left Paw Prints on the Pages of This Medieval Manuscript (smithsonianmag.com)

1

Gulliver's Travels: Week 11 (karenswallowprior.substack.com)

5

Global cybercrime crackdown: over 373 000 dark web sites shut down (europa.eu)

2

Study finds that we could lose science if publishers go bankrupt (2024) (arstechnica.com)

7

AI Slop Is Infiltrating Online Children's Content (undark.org)

3

Hallucinated References: Five Excuses for Academic Misconduct (dorotheabaur.ch)

2

Smells Like Teen Spirit [pdf] (static1.squarespace.com)

2

What to Watch in March: Häxan (1922) (crimereads.com)

1

Host Software (1969) (ietf.org)

2

The Hyperscale IPv4 Moat: Analyzing AWS's Latest 9M Address Acquisition (circleid.com)

1

Generative AI in business schools: friend or foe? (theconversation.com)

7

Cyber-Attacks Against the EU and Its Member States: Council Sanctions (europa.eu)