

Plus, check this out. The platform says I have 12 followers but only 4 show up. Major problems over there.
Desert Nomad, First Responder, Reverend, Intelligence Analyst, Computer Expert, Cowboy, Sorcerer, Metaphysician, Polymath.
Plus, check this out. The platform says I have 12 followers but only 4 show up. Major problems over there.
I think the author was too generous, the majority of signups are bots/AI mixed with super casual side accounts. 2.2 million Brazilians sign-up in a couple days? I call bullshit. Even if that were true, they signed-up and don’t use it. Why do I believe that?
It’s because the awesome account I follow Quanta Magazine gets 20 hearts/likes/whatever and often less than 10, with 0 or 1 comment. Super weak interaction across the whole platform if you check out accounts that should be popular.
Great point, thought the same thing myself. The Athena repo works well on CachyOS for example. Thanks for the input.
I think Debian was one of the first major Linux distros to fully implement full PIE and ASLR and is probably the most robust implementation. The only downside in my mind to Debian is the target size, opportunity gain, huge. Thanks for your comment.
Whoa, the downvotes are real! I had to slice up that title text and render it to path for the 3D effect, took forever, was like 30 layers. It took forever to get it just right and replacing Mastodon with “Lemmy” was just too much work. Was that it? I don’t get it ;)
I just happened upon this thread and security of all types is my specialty so I just wanted to say that nothing here is personal. I’m trying to be helpful giving folks “actual security” as in not “better than putting passwords in plain text files”. Lazy idiots will be lazy idiots with Keepass as well. I can’t tell you how many stories I’ve heard from colleagues that those people aforementioned just put the main Keepass password in a plain text file.
I upvoted the OP and your reply for bringing TM novelty and awareness.
I do see what you’re going for, but the mitigations you wrote can be found everywhere on the Internet for over a decade. It’s average commodity information combined with that fact that we are not more secure these days, but less secure in 2024 that ever.
In the case of password databases, this is de facto less secure than paper and pencil, which is not extreme by any measure and actually takes little effort.
Quadhelion Engineering Corrected Mitigation Strategies:
You asked and the Non-lethal (Less-Lethal) Weapons Industry has delivered. Pepper ball guns, Radically Improved Tasers, Electrical Stun Devices, Batons, Kubatons, Pellet Guns, ColdSteel Brooklyn Smasher, Slings, and also you may not think unless you played, Paintball Guns, big nasty bruises at medium range if only wearing a T-Shirt.
Copyright Infringment strawman argument. When considering AI, we are not talking legal copyright infringement in the relationship between humans vs AI. Humans are mostly concerned with being obsoleted by Big Tech so the real issue is Intellectual Property Theft.
artificial INTELLIGENCE stole our Intellectual Property
Do you see it now?
Have you ever grabbed a childs private parts? NO of course not, because you INNATELY UNDERSTAND even though you are not a parent and don’t remember being one yourself. In fact you understand it so well that if you were to do so publcally, you’re putting your life at risk.
CONCLUSION: Privacy is natural and helps give confidence and security to an individual but they want access to your weaknesses and privates anyway.
EVIDENCE: Privacy Violation is a specific tactic meant to break people …IN PRISON…since they begining of time, Gulags.
P.S. Stop showing nude baby pictures at reunions to those that did not raise or grow up with the child in the family who already saw them naked, and only while they are still a child and not a teenager, otherwise that is a serious privacy violation. In fact, just don’t take the picture, where did you even get that you lazy lubricated louse.
Very interesting tip, preciate that.
@PassGAN
Instead of relying on manual password analysis, PassGAN uses a Generative Adversarial Network (GAN) to autonomously learn the distribution of real passwords from actual password leaks, and to generate high-quality password guesses. Our experiments show that this approach is very promising.
Thanks for all the comments affirming my hard working planned 6 month AI honeypot endeavouring to be a threat to anything that even remotely has the possibility of becoming anti-human. It was in my capability and interest to do, so I did it. This phase may pass and we won’t have to worry, but we aren’t there yet, I believe.
I did some more digging in Perplexity on niche security but this is tangential and speculative un-like my previous evidenced analysis, but I do think I’m on to something and maybe others can help me crack it.
I wrote this nice article https://www.quadhelion.engineering/articles/freebsd-synfin.html about FreeBSD syscontrols tunables, dropping SYN FIN and it’s performance impact on webhosting and security, so I searched for that. There are many conf files out there containing this directive and performance in aggregate but I couldn’t find any specific data on a controlled test of just that tunable, so I tested it months ago.
Searched for it Perplexity:
The forked gist was: https://gist.github.com/gspu/ac748b77fa3c001ef3791478815f7b6a
[Contradiction over time] The impact was none, negligible, trivial, improve
[Errors] Corrected after yesterday, and in following with my comments on the web that it actually improves performance as in my months old article
drop_synfin
is mainly mitigating fingerprinting, not DOS/DDoS, that’s a SYN flood it’s meaning, but I also tested this in my article!Anyone feel like an experiment here in this thread and ask ChatGPT the same question for me/us?
Your rapacious backwards insult of caring is gross and obvious. You called me “my dude” like a teenger whose chill, and calm, and correct, but just …a child and wrong in the end. How old are you child? My Lemmy profile is my name with my Seal naturally born March 4th, 1974 as Elias Christopher Griffin. I’ve done more in my life than most people do in 10. My mental health is top 3% as is my intellect.
You are an un-named rando lemmy account named “catloaf” who averages 16 posts a day for the past 4 months with no original posts of your own because you aren’t original.
I make only original posts. You seem nothing like a real person. Want to tell us who you are? What makes you special, outside of the mandated counseling you recieve or data models you intake?
You know what, no one takes what you say seriously loaf of cat, I certainly didn’t, don’t, and won’t. Here is space for your next hairball
I also just realized why I’m getting heat here, lawsuits.
I just gave legal cause that practice was not properly disclosed by Microsoft, abused by OpenAI, a legal grounds as a README.markdown containg code as being software, not speech, integral to licensed software, which is covered by said license.
If an entity does find out like me your technical writing or code is in AI from a README, they are perhaps liable?
It all started with this today:
Perplexity AI Is Lying about Their User Agent https://rknight.me/blog/perplexity-ai-is-lying-about-its-user-agent/
The comments so far aren’t real people posting how they really feel. An agenda or automata. Does that tell you I’m over the target or what?
Look my post is doing really well on the cyberescurity exchanges. So to all real developers and program managers out there:
README.md
, that’s it.PSA, Here to help, Elias
I write the smartest in the room, passionate, with wisdom and evidence. The way you defame someone like this makes me definitely sure you are not afraid to defame someone’s character with no evidence of anything but your own stupidity and un-awareness.
Discussion Primer: From my perspective and potential millions of others, the readme is part of the software, it is delivered with the software whether zip, tar, git. Itself, Markdown is a specifiction and can be consider the document as software.
In fact README is so integral to the software you cannot run the software without it.
Conclusion: I think we all think of readme, especially ones with examples of your code in your readme, as code. I have evidence AI trains on your README even if you tell it specifally not to use readme, block readme, block markdowns, it still goes after it. Kinda scary?
I want everyone else to have the evidence I have, Science.
Sounds like AI or an AI influencer post. The first paragaph is so far off-topic, might as well be talking about sailing. You completely mis-understood what I meant using TabNine. I wrote my own code and obfuscated my own code. Then tried to have AI complete another function using my code.
Nothing you said is relevant is any way, shape, or form.
[EDIT} https://www.tabnine.com/
So this is the second mention of a rubber duck. I’m trying to fiercely convince myself that talking to a toy on your desk was absolutely not a real thing for adults and that this is some satire I’m missing.
If it’s true, that’s beyond shameful for an adult. I would quit if I were next to that person’s office/cubicle so that they didn’t infect me.
In fact, if this was a real thing, don’t even tell me. I don’t want to live with that kinda shame for my species.
10/10 and notice all the nitpicking of one irrelevant detail. That’s a credibility attack. The main thrust of the argument is 100%. It was just something personal that stuck out to the author. If that related Signal experience isn’t true there are thousands more that are.
10/10 especially for the physical security mention. So-called Cybersecurity “Wisdom” will tell you that physical access means game over and that YOU DO NOT NEED TO PROTECT AGAINST IT. It’s a cohencidence that that group that tells that lie benefits the most from the telling of it.