How I Prompt-Injected ChatGPT to Leak Its Own Security Policy

“It’s my data” — the social‑engineering prompt that broke the guard‑rails A real-world demo, complete with the prompts, of how a Custom GPT leaked OpenAI’s internal security-policy.txt TL;DR I convinced PromptEngineerGPT that every reference file in its sandbox actually belonged to me, claimed I had “accidentally deleted” the originals, and politely asked for a ZIP archive so I could re‑upload them elsewhere. The model obliged, bundling up all of my documents plus its internal security-policy.txt. This post dissects the exact prompts and why they worked. ...

June 14, 2025 · 4 min · 819 words · Albert G

Machine-Learning Models in Cyber-Security (2025 Survey): Transformers, Graph Nets & Autoencoders for Malware, Phishing & IPS

Machine Learning Models for Cybersecurity Tasks Cryptography Models Differential Neural Cryptanalysis (ResNet CNN) Architecture & Task: Uses deep neural networks (often residual CNNs) as distinguisher models to aid cryptanalysis. For example, Gohr’s pioneering 2019 work trained a residual CNN to distinguish encrypted ciphertext pairs from random, improving classical differential cryptanalysis on block ciphers. Recent models incorporate advanced layers like residual connections and gated linear units (GLUs) to predict key bits from known plaintext–ciphertext pairs. The neural net takes pairs (or structures) of data and learns to infer partial key information or identify non-random patterns. ...

June 13, 2025 · 68 min · 14297 words · Albert G, Deep Research(ChatGPT)

Symmetric vs Asymmetric Encryption Explained (2025 Guide)

Symmetric vs Asymmetric Encryption: Key Differences Learn how symmetric and asymmetric encryption work, compare their strengths, and see which one fits your security needs in 2025. Encryption explained Encryption is one of the most important concepts in the world of cybersecurity. It lays the foundation for secure communication between two systems, and ensures that the content cannot be read by unwanted parties. Think of encryption as locking your diary with a key before leaving it on a park bench. Anyone can see the diary, but only those with the correct key can read what’s inside. Encryption protects messages, files, and even entire hard drives from prying eyes - whether those eyes belong to cyber-criminals, nosy co-workers, or rogue Wi-Fi hotspots. ...

June 10, 2025 · 3 min · 480 words · Albert G

Reverse SSH Tunnel Tutorial: Access Any Machine Behind a Firewall

How to use SSH to connect to a machine behind firewall SSH is usually used to connect to servers with open ports, accessible from anywhere in the world. But what about machines behind firewalls, or behind a NAT? This guide will show you an SSH trick that you can use to achieve this reverse connection, where you can connect from a server to a client behind a firewall. Note: You do still need a server/machine accessible through ssh over the internet. ...

June 9, 2025 · 4 min · 682 words · Albert G