Remove tag arm
article thumbnail

Gaining kernel code execution on an MTE-enabled Pixel 8

Hacker News

In this post, I’ll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. I’ll show how this vulnerability can be exploited even when Memory Tagging Extension (MTE), a powerful mitigation, is enabled on the device.

182
182
article thumbnail

How Wayfair accelerated product tagging automation with Snorkel Flow

Snorkel AI

Wayfair relies on machine learning (ML) and product tagging to ensure customer searches result in relevant products. Tagging information like color, style, and pattern can make all the difference in a customer finding the right product at the right time. blue outdoor pillows”), they rely on product tags (e.g.

ML 64
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Wayfair accelerated product tagging automation with Snorkel Flow

Snorkel AI

Wayfair relies on machine learning (ML) and product tagging to ensure customer searches result in relevant products. Tagging information like color, style, and pattern can make all the difference in a customer finding the right product at the right time. blue outdoor pillows”), they rely on product tags (e.g.

ML 59
article thumbnail

How Wayfair built better, faster catalog tagging with Snorkel Flow

Snorkel AI

What are product tags? We use product tags to organize and store descriptive information about our products. These tags capture specific attributes of each product, such as its color, design, and pattern, in a structured manner. Examples of theme-related tags include “Outer Space Rug,” “Bird Decorative Object,” etc.

article thumbnail

How Wayfair built better, faster catalog tagging with Snorkel Flow

Snorkel AI

What are product tags? We use product tags to organize and store descriptive information about our products. These tags capture specific attributes of each product, such as its color, design, and pattern, in a structured manner. Examples of theme-related tags include “Outer Space Rug,” “Bird Decorative Object,” etc.

article thumbnail

The Most Hackable Handheld Ham Radio Yet

Hacker News

Prior to the 5R, the price tag of the cheapest VHF/UHF handheld was a little north of US $100. And the CPU is not brimming with compute power—it’s a 48-megahertz, 32-bit ARM-based processor with 8 KB of RAM. It caught my attention in part because for over a decade, Baofeng has been the name in Chinese handhelds.

Python 181
article thumbnail

Operation Triangulation: The last (hardware) mystery

Hacker News

This motivated me to take a deeper look at its firmware, which is also written in ARM and unencrypted, but I could not find anything related to these registers in there. This file contains code for working with the ARM CoreSight MMIO debug registers of the main CPU. And here are the tag names for regions used by the exploit.

Algorithm 182