

This thread is wild, I’m here like “cmake is by far the simplest way to cross compile to ARM and x86, with and without Cuda build targets” and y’all are talking about IDEs for some reason.
This thread is wild, I’m here like “cmake is by far the simplest way to cross compile to ARM and x86, with and without Cuda build targets” and y’all are talking about IDEs for some reason.
Manual makefiles don’t scale though and you end up needing some other bootstrap framework pretty quick.
UNDEFINED SYMBOL AAHDYVBBDJFUE804746BBBB
The reality is just that some kind of python code will have the same race conditions as most other languages moving forward and that’s ok.
So it’s like slightly more responsible Python
deleted by creator
Can you live without using your thumbs?
deleted by creator
Kind of, it’s kind of like using a calculator instead of doing arithmetic by hand when doing load and strain calculations. It’s a tool which cuts down on the tedious (and error prone) parts of engineering but doesn’t replace the expertise. I use it frequently to write code snippets for things I don’t know the exact sytax for but could easily look up. It just saves time.
Like, we have a guy whose entire job is to understand the ins and outs of a particular bit of modeling software. In the future that will likely be a person who runs the AI which understands the ins and outs of the modeling software. And eventually the AI will replace that software entirely.
The most important part of being a prompt engineer is knowing when the responses are bullshit. Which is how the AI field has been the whole time - it selects for niche expertise.
This but unironically
I’ve been on this pedestal for years. Pop security YouTube has been overtly preying on rubes to sell shady VPN services for a decade now and it’s super cringe. There is no magic bullet to cyber security and it takes real effort and knowledge to be safe.
I am skeptical of this being viable on public Wi-Fi tbh. You’d need to know ahead of time which VPN servers the target will attempt to contact, some information about the target ahead of time, and you need to DHCP poison the entire network prior to the target connecting. That would effectively bring down the network for all but two hosts - the attacker and target.
I mean at that point, you can also just repeatedly deauth the target until it connects to your spoofed network and do whatever you want, and it would be way less obvious to an outside observer.
I’m a bit confused how this is considered a new vulnerability. The IETF RFC which proposes option 121 literally states that malicious DHCP servers could be used to redirect traffic to malicious hosts, and I’m fairly confident that we learned about this exact thing in CCNA school in like 2003 (with regards to router configuration security).
I suppose the application to a VPN attack might be relatively novel?
Merge commits 🙅
Rolling back demo commit
I have legitimately never met a single person in real life who has anything positive to say about bazel, and I assume it it because they have all killed themselves.