hatedbad

joined 1 year ago
[–] hatedbad@lemmy.sdf.org 10 points 1 month ago

a surprisingly disappointing article from ars, i expect better from them.

the author appears to be confusing “relay attacks” with “cloning” and doesn’t really explain the flow of the attach that well.

really this just sounds like a complicated MitM attack, using the victim’s phone as the “middle” component between the victim’s physical card and the attacker’s rooted phone.

the whole “cloning the UID attack” at the end of the article is irrelevant, NFC payment cards don’t work like that.

[–] hatedbad@lemmy.sdf.org 1 points 1 month ago (1 children)

Microsoft creates secure boot: “we should be able to run whatever we want on our hardware!”

Microsoft lets users install crowdstrike on their computer: “Microsoft shouldn’t let us run this on our hardware!”

[–] hatedbad@lemmy.sdf.org 6 points 2 months ago (2 children)

20 years? more like 5

[–] hatedbad@lemmy.sdf.org 21 points 2 months ago (1 children)

if this is your first time doing a big trip together, honestly, forget about it being prefect. it won’t be, and that’s ok. trips don’t need to be perfect to be meaningful, in fact, i’ve found the opposite to be true. the more wild and unexpected the adventure is, the more memorable and important it becomes to me.

so I’d say it’s best to keep an idea of things you’d like to see or do, but also be flexible and willing to adapt. traveling with someone that forces everyone to stick to a rigid itinerary is never fun and is a good way to ruin the trip. all it takes is one lost bag or one missed train to throw all your careful planning out the window. better to roll with the punches than self destruct when that happens.

[–] hatedbad@lemmy.sdf.org 1 points 4 months ago

if you’re talking about that recent pic of him floating around with a chain and a bread, that was an AI doctored photo

[–] hatedbad@lemmy.sdf.org 28 points 4 months ago (1 children)

this kinda shit makes me understand the sovcit stuff a little more, “just send an email with this magic subject text and your rights are secured!”

[–] hatedbad@lemmy.sdf.org 1 points 5 months ago

you’re so close, just why exactly do you think people are using it for these things it’s not meant for?

because every company, every CEO, every VP, is pushing every sector of their companies to adopt AI no matter what.

most actual people understand the limitations you list, but it’s the capitalists at the table that are making AI show up where it’s not wanted

[–] hatedbad@lemmy.sdf.org 1 points 5 months ago (1 children)

TLS doesn’t encrypt the host name of the urls you are visiting and DNS traffic is insanely easy to sniff even if you aren’t using your ISPs service.

[–] hatedbad@lemmy.sdf.org 1 points 5 months ago

babe wake up, a new bone-apple-tea just dropped

[–] hatedbad@lemmy.sdf.org 1 points 5 months ago (1 children)

the hostname of a website is explicitly not encrypted when using TLS. the Encrypted Client Hello extension fixes this but requires DNS over HTTPS and is still relatively new.

[–] hatedbad@lemmy.sdf.org 8 points 5 months ago (1 children)

just a guess, but in order for an LLM to generate or draw anything it needs source material in the form of training data. For copyrighted characters this would mean OpenAI would be willingly feeding their LLM copyrighted images which would likely open them up to legal action.

[–] hatedbad@lemmy.sdf.org 9 points 6 months ago (1 children)

open source software getting backdoored by nefarious committers is not an indictment on closed source software in any way. this was discovered by a microsoft employee due to its effect on cpu usage and its introduction of faults in valgrind, neither of which required the source to discover.

the only thing this proves is that you should never fully trust any external dependencies.

view more: next ›