deleted by creator
Can you live without using your thumbs?
Kind of, it’s kind of like using a calculator instead of doing arithmetic by hand when doing load and strain calculations. It’s a tool which cuts down on the tedious (and error prone) parts of engineering but doesn’t replace the expertise. I use it frequently to write code snippets for things I don’t know the exact sytax for but could easily look up. It just saves time.
Like, we have a guy whose entire job is to understand the ins and outs of a particular bit of modeling software. In the future that will likely be a person who runs the AI which understands the ins and outs of the modeling software. And eventually the AI will replace that software entirely.
The most important part of being a prompt engineer is knowing when the responses are bullshit. Which is how the AI field has been the whole time - it selects for niche expertise.
This but unironically
I’ve been on this pedestal for years. Pop security YouTube has been overtly preying on rubes to sell shady VPN services for a decade now and it’s super cringe. There is no magic bullet to cyber security and it takes real effort and knowledge to be safe.
I am skeptical of this being viable on public Wi-Fi tbh. You’d need to know ahead of time which VPN servers the target will attempt to contact, some information about the target ahead of time, and you need to DHCP poison the entire network prior to the target connecting. That would effectively bring down the network for all but two hosts - the attacker and target.
I mean at that point, you can also just repeatedly deauth the target until it connects to your spoofed network and do whatever you want, and it would be way less obvious to an outside observer.
I’m a bit confused how this is considered a new vulnerability. The IETF RFC which proposes option 121 literally states that malicious DHCP servers could be used to redirect traffic to malicious hosts, and I’m fairly confident that we learned about this exact thing in CCNA school in like 2003 (with regards to router configuration security).
I suppose the application to a VPN attack might be relatively novel?
Merge commits 🙅
Rolling back demo commit
Honestly I can see this being the worlk of someone who had to deal with one of those stupid fucking online interview code tests which require crazy screen monitoring permissions. What a better way to kill off that trend entirely than to make the very practice an active cyber-security risk?
For a lot of experienced people, command line tools are user friendly interface design.
You are not entirely wrong, but just as some advice I would refrain from displaying fear of the command line in interviews.
A copy is fine. I can still seek vengeance on my enemies from beyond the grave.
I can use my published PGP keys with XMPP, for starters. And I can use OMEMO. Matrix supports neither afaik.
So it’s like slightly more responsible Python