sorted by: new top controversial old
[-] hatedbad@lemmy.sdf.org 10 points 3 weeks ago

a surprisingly disappointing article from ars, i expect better from them.

the author appears to be confusing “relay attacks” with “cloning” and doesn’t really explain the flow of the attach that well.

really this just sounds like a complicated MitM attack, using the victim’s phone as the “middle” component between the victim’s physical card and the attacker’s rooted phone.

the whole “cloning the UID attack” at the end of the article is irrelevant, NFC payment cards don’t work like that.

[-] hatedbad@lemmy.sdf.org 6 points 1 month ago

20 years? more like 5

[-] hatedbad@lemmy.sdf.org 2 points 2 months ago

start with basics:

  • install iperf on every device you can between an external device and your internal host(s) and use it to find any bottlenecks
  • use tools like tcpdump to analyze packets flowing over the network. you can often find surprising results this way
  • start with a simple test best (again, iperf) with the most simple config (no nginx etc) and add the complexity of your config bit by bit until the issue returns
[-] hatedbad@lemmy.sdf.org 1 points 4 months ago

you’re so close, just why exactly do you think people are using it for these things it’s not meant for?

because every company, every CEO, every VP, is pushing every sector of their companies to adopt AI no matter what.

most actual people understand the limitations you list, but it’s the capitalists at the table that are making AI show up where it’s not wanted

[-] hatedbad@lemmy.sdf.org 1 points 4 months ago

TLS doesn’t encrypt the host name of the urls you are visiting and DNS traffic is insanely easy to sniff even if you aren’t using your ISPs service.

[-] hatedbad@lemmy.sdf.org 8 points 5 months ago

just a guess, but in order for an LLM to generate or draw anything it needs source material in the form of training data. For copyrighted characters this would mean OpenAI would be willingly feeding their LLM copyrighted images which would likely open them up to legal action.

[-] hatedbad@lemmy.sdf.org 8 points 5 months ago

open source software getting backdoored by nefarious committers is not an indictment on closed source software in any way. this was discovered by a microsoft employee due to its effect on cpu usage and its introduction of faults in valgrind, neither of which required the source to discover.

the only thing this proves is that you should never fully trust any external dependencies.

[-] hatedbad@lemmy.sdf.org 4 points 5 months ago

git bisect is just this guy jumping through portals to alternate universes where the bug either exists or doesn’t

[-] hatedbad@lemmy.sdf.org 2 points 5 months ago

yeah silly me for supporting artists with my money but also downloading drm-free copies of things so I can actually exercise a semblance of ownership. but sure, keelhaul me so you can keep your sense of smug superiority.

[-] hatedbad@lemmy.sdf.org 1 points 5 months ago

AI is a tool that is fundamentally based on the concept of theft and plagiarism. The LLM training data comes from artists and creators that did not consent to their work being plagiarized by a hallucinating machine.

[-] hatedbad@lemmy.sdf.org 7 points 6 months ago

it literally explains what they’re for in the product listing:

These labels aid your warehouse operations.

• Categorize inventory, reorder points, product dating or special instructions.

• Apply these labels to pallets, boxes and shelves for easy identification.

• Easy to write on.

view more: next ›

hatedbad

joined 1 year ago