Stubsack: weekly thread for sneers not worth an entire post, week ending Sunday 05 May 2024
Have a sneer percolating in your system but not enough time/energy to make a whole post about it? Go forth and be mid!
Any awful.systems sub may be subsneered in this subthread, techtakes or no.
If your sneer seems higher quality than you thought, feel free to cut’n’paste it into its own post, there’s no quota for posting and the bar really isn’t that high
The post Xitter web has spawned soo many “esoteric” right wing freaks, but there’s no appropriate sneer-space for them. I’m talking redscare-ish, reality challenged “culture critics” who write about everything but understand nothing. I’m talking about reply-guys who make the same 6 tweets about the same 3 subjects. They’re inescapable at this point, yet I don’t see them mocked (as much as they should be)
Like, there was one dude a while back who insisted that women couldn’t be surgeons because they didn’t believe in the moon or in stars? I think each and every one of these guys is uniquely fucked up and if I can’t escape them, I would love to sneer at them.
that was quick! the CEO’s denial is very funny for a number of reasons, but the jig’s up — the supposed point of this device (the assistant) just straight up works on an Android phone, and their modifications to AOSP are almost certainly relatively trivial shit (permissions hole-punching for app interoperability… I can’t actually name a second thing they’d need).
but speaking of that denial:
We are aware there are some unofficial rabbit OS app/website emulators out there. We understand the passion that people have to get a taste of our AI and LAM instead of waiting for their r1 to arrive. That being said, to clear any misunderstanding and set the record straight, rabbit OS and LAM run on the cloud with very bespoke AOSP and lower level firmware modifications, therefore a local bootleg APK without the proper OS and Cloud endpoints won’t be able to access our service.
hoo boy, in detail:
what unofficial emulator? this is the APK the device runs.
what rabbit OS? the fucking thing runs an AOSP fork locally.
it seems to access rabbit’s cloud endpoints just fine in the video. they even make an account with the device.
is the response here really that it isn’t an Android phone cause all the functionality is in the cloud? cause that really doesn’t sound like something that needs bespoke hardware to me.
My opinion is that Jesse Lyu is lying about making any significant changes. (Because otherwise the demo wouldn't have worked)
I don't want bad things for him personally, but I want bad things to happen to people who lie in public.
The code is open source with licensing requirements, so I'm therefore hoping someone Jesse has already made a statement to can write him with these requests:
For GPL2 licensed components such as Linux: Give me your changes in source form.
For Apache-licensed components such as Android: What files did you change?
I can imagine him responding in three ways:
"Sure, here is another lie" -- and then he's locked into an answer which will probably make him look clueless as hell
"We don't think we have to do that" -- and now the Open Source Reply Guy Brigade instantly hates him.
<no reply> -- and now, given that a conversation has actually occurred, he looks evasive.
The craziest part is that it works as well on a standard phone.
We didn’t bother testing out any other functionality, such as Spotify integration, Vision, etc., but we wouldn’t be surprised if some of them didn’t work.
The craziest part is that it works as well on a standard phone.
I'm not terribly surprised by this - vendors (and especially rapid-integrators rushing to get to market) are often extremely lazy with this sort of thing. sometimes just by downloading an app (from whatever resource) and poking at it for a small amount of time, you can get it to register and be issued tokens and all kinds of shit
a lot of entities spend most of their efforts on surface things, things users will see. very, very few allocate to foundational parts.
In which the Orange Site is a very bad influence on some minors:
How do you evaluate “factuality” without knowing all the facts, though? That’s the downfall of all such services - eventually (or even immediately) they begin to just push their preferred agenda because it’s easier and more profitable.
Hi there, thank you for your feedback! I think we could potentially go down the route of a web3 approach where we get the public consensus on the facts.
...
Your first meta-problem to solve is to get people to care about the facts, and to accept them when they’re wrong. There is an astonishing gap between knowing the truth and acting accordingly.
Yea, that's why we also added in an grammar checker, even if they dont care about facts, they can get something better than gram marly that checks for way more for way less.
Yesterday evening The Post Millennial, a Canadian conservative news website, was compromised. The landing page was defaced, displaying the transgender flag, as well as making a satirical post mocking conservative author and social media commentator Andy Ngo.
The Threat Actor(s) responsible for the compromise leaked information on 39,850 subscribers to the website. The leaked information includes:
Gender
Name
Display name
Nick name
E-mail address
Phone number
Address
Password
Subscriber details (payment information)
'Daleted' – a boolean field incorrectly spelled
and more...
Passwords are in plain text. Payment information does not display credit card information. Payment information displays preferred payment method (e.g. PayPal, Credit Card, Debit Card) and currency used (e.g. CAD, USD). Some fields are optional such as telephone number or address. Additionally, this leak unveils some information on government representatives across the globe – including United States government personnel. This displays their contact information in plain text.
Also, the Threat Actor(s) leaked information on authors for The Post Millennial editors. We are not sure on the validity of this data, unless this website has 761 editors. Editor information disclosure shows:
Username
IP Address
Phone number
Country
Email address
Name
Image 1. Snippet of leaked subscriber information
Image 2. Snippet of leaked editor information
Image 3. Defaced website and satirical post
Note:
No Threat Actor(s) have taken credit for the compromise
Individuals reviewing the data suspect the parent company, Psyclone Inc, may have been the initial access point. Evidence supporting this is debug data present in The Post Millennial database dump as well as adjacent website HumanEvents going offline – however this still remains speculation.
The compromise of The Post Millennial is clearly politically motivated. Please be civil.
Passwords are in plain text. Payment information does not display credit card information. Payment information displays preferred payment method (e.g. PayPal, Credit Card, Debit Card) and currency used (e.g. CAD, USD).
People actually pay money for the fucking Post Millennial.
The way LLM boosters talk about GPTs reminds me of how one of my kids tried to convince himself that his stuffies are really alive.
The same desire to believe in adults is so unsettling to me. They're desperately trying to fill a hole in their life where family, friends, culture, or religion should be. My first instinct would be compassion if it weren't for all of the economic dislocation and fascism.
you can’t just hit me with fucking comedy gold with no warning like that (archive link cause losing this would be a tragedy)
So my natural thought process was, “If I’m using AI to write my anti-malware script, then why not the malware itself?”
Then as I started building my test VM, I realized I would need help with a general, not necessarily security-focused, script to help set up my testing environment. Why not have AI make me a third?
First, I created a single junk file to actually encrypt. I originally made 10 files that I was manually copy pasting, and in the middle of that, I got the idea to start automating this.
this one just copies a file to another file, with an increasing numerical suffix on the filename. that’s an easily-googled oneliner in bash, but it took the article author multiple tries to fail to get Copilot to do it (they had to modify the best result it gave to make it work)
rudi_ransom.py
(rudimentary ransomware)
I won’t lie. This was scary. I made this while I was making lunch.
this is just a script that iterates over all the files it can access, saves a version encrypted against a random (non-persisted, they couldn’t figure out how to save it) key with a .locked suffix, deletes the original, changes their screen locker message to a “ransom” notice, and presumably locks their screen. that’s 5 whole lines of bash! they won’t stop talking about how they made this incredibly terrifying thing during lunch, because humblebragging about stupid shit and AI fans go hand in hand.
rrw.py
(rudimentary ransomware wrecker)
This was honestly the hardest script to get working adequately, which compounds upon the scariness of this entire exercise. Again, while I opted for a behavior-based detection anti-ransomware script, I didn’t want it to be too granular so it could only detect the rudi_ransom.py script, but anything that exhibits similar behavior.
this is where it gets fucking hilarious. they use computer security buzzwords to describe such approaches as:
trying and failing to kill all python3 processes (so much for a general approach)
killing the process if its name contains the string “ransom”
using inotify to watch the specific directory containing his test files for changes, and killing any process that modifies those files
killing any process that opens more than 20 files (hahaha good fucking luck)
killing any process that uses more than 5% CPU that’s running from their test directory
at one point they describe an error caused by the LLM making shit up as progress. after that, the LLM outputs a script that starts killing random system processes.
so, after 42 tries, did they get something that worked?
I was giving friends and colleagues play-by-plays as I was testing various iterations of the scripts while writing this blog, and the consensus opinion was that what I was able to accomplish with a whim was terrifying.
I’m not going to lie, I tend to agree. It’s scary that was I was able create the ransomware/data wiper script so quickly, but it took many hours, several days, 42 different versions, and even more minor edits to fail to stop said ransomware script from executing or kill it after it did. I’m glad the static analysis part worked, but that has a high probability of causing accidental deletions from false positives.
I just want to reiterate that I had my AI app generate my ransomware script while I was making lunch…
I was giving friends and colleagues play-by-plays as I was testing various iterations of the scripts while writing this blog, and the consensus opinion was that what I was able to accomplish with a whim was terrifying.
This is correct, but not for the reasons they think it is terrifying. Imagine one of your coworkers revealing they are this bad at their job.
"guys guys! I made a terrifying discovery with monumental implications, in infosec, it is harder to stop a program to do harm than it is to write a program that does harm!" (Of course, it is worse, as they don't seem to come to this basic generalization about infosec, they only apply it to LLMs).
I read a few of the guy's other blog posts and they follow a general theme:
He's pretty resourceful! Surprisingly often, when he's feeling comfortable, he resorts to sensible troubleshooting steps.
Despite that, when confronted with code, it seems like he often just kind of guesses at what things mean without verifying it.
When he's decided he doesn't understand a thing, he WILL NOT DIG INTO THE THING.
He seems totally hireable as a junior, but he absolutely needs the adult supervision.
The LLM Revolution seems really really bad for this guy specifically -- it promises that he can keep working in this ineffective way without changing anything.
it has to be behavior-based detection. I didn’t want to build a script that was only useful to detect and mitigate the specific ransomware executable I created for this blog. Signature-based detection is only useful for a particular file. The second a single byte changes, the file will have a new hash.
(which is not exactly how AV signatures work but anyways...)
How it's going:
[...] scans any file in the /home director, for the strings "cryptography", "cryptodome", "ransom", "locked", "encrypt".
If all script kiddies waste their time trying to use generative AI to produce barely functional malware, we might be marginally safer for a while ^^.
Or maybe this is the beginning of an entirely new malware ecology, clueless development using LLMs falling prey to clueless malware using LLMs.
our disappointing cyberpunk future where everything looks like Hollywood hacking because you’re just typing prompts to generate stupid exploit scripts at an LLM, but they all work because the people writing the software being exploited also don’t know what they’re doing
Not wanting to be left out of the action and let our good friends have all the robotic god fun, the catholic church has also got in on the action, and it went so good
From some of those replies you just know the kinds of training data it must’ve had.
Catholic Answers works each day to ensure our content is faithful to the Magisterium. Our staff apologists have decades of practice in apologetics, and several hold advanced degrees in theology and philosophy. We maintain a broad list of associates (clergy and laymen) who are experts in the fields of liturgy, history, bioethics, theology, philosophy, canon law, and more.
"And we've decided to throw the hard work of these people under the bus in favor of an unfinished toy that ridicules our faith. A consultant named Damien Thorn made a compelling case!"
the imagery (in the article) is also amazing, it's like if someone took all the images of Civ leader dialogue screens as source material for direct replication "inspiration"
One thing I’d mention is that we spent a lot of time beta-testing this, with thousands of people, before we released it. We did six months of that beta-testing.
I’m sure they tested it, but were their testers the nice Catholic people they happen to know, or, you know, normal internet people?
some fucking wild promptfondlers commenting on an LWN article about Gentoo banning AI pull requests. Thankfully LWN has enough readers who know how a computer fucking works to answer them correctly.
I like the beautiful tangents into linguistics and arguing about how many present tenses English has, and of the dubious merit of distinguishing definiteness in articles.
Trying to invoke LLMs as a tool to pierce these supposedly pointless elements of the English language, for the benefit of non-native (or maybe non-confident native) speakers.
Where really this is exactly the sort of mistakes that LLMs can bring, it’s not just choosing between a non-standard and a standard spelling of a word (like for basic autocorrect) it’s choosing between valid forms depending on context and Intent, which no machine can divine.
If you went to Effective Altruism parties in Berkeley in last 10-12 years, I'd like to talk to you. Glad to speak on background. Thanks.
Jacob is at [email protected]. I can personally recommend him as a good guy and honourable journalist. He co-wrote "Easy Money" with Ben McKenzie, the story of the recent crypto bubble.
this is the "Mark Fuentes" article again, evidently he thinks it didn't get enough traction
the comments are amazing and yet utterly predictable. Torres is being bad faith in accusing the one-issue pseudonymous account of being bad faith. EAs are very left wing u kno. Race science is well worth our time to consider. etc. they're gonna beat the accusations by enthusiastically confirming every one
A lot of things there are just amazingly odd. Helen Pluckrose is such a nice liberal woman (who complains a lot about the left and helped the horrible James Lindsay gain fame), the part about Cowen is 'Torres misrepresents Cowen as saying he cares about the rich over the poor, but that is not fair to Cowen, Cowen just wants to take money away from the currently poor, to give to the currently rich, so the current rich can help the future poor via trickle down economics'.
This had me wondering, how common is the name Fuentes at all? Cause I keep having a small brainfart and thinking about Nick and I really hope that is a problem between my keyboard and chair and not intentional.
E: also EA/LW shooting the messenger, as is tradition.
(this is why im not a huge fan of the tescreal term, as this muddies the water quite a lot as this is a longtermist 'what about the tiny existential risk' thing rubbing against the transhumanist biohacking style stuff).
Sorry no nitter as I forgot the correct url (and also I heard the people behind the new nitter might suck a lot, as in they might be far right, but only heard that once so please don't take that as a confirmation, and more a me asking about it).
there are few non-poast nitter instances barely limping along, but unless it actually comes back I think the best policy is to link normal twitter and let individuals manage what nitter instances, if any, they want to use: