Please open Telegram to view this post
VIEW IN TELEGRAM
my dad be wildin
like nigga, ainnoway you were traveling 30kms, crossed a river and walked through the jungle each day to get to your elementary school. nah i ain't fallin for that. that's the unrealest shi i've ever heard. even unreal than me having a gf
like nigga, ainnoway you were traveling 30kms, crossed a river and walked through the jungle each day to get to your elementary school. nah i ain't fallin for that. that's the unrealest shi i've ever heard. even unreal than me having a gf
🤣18
Forwarded from Gianmarco Gargiulo Mastodon Bridge
Forwarded from Gianmarco Gargiulo Mastodon Bridge
***** Google's plans to restrict sideloading on Android are an authoritarian wet dream come true *****
Let me be really clear about how horrifically dangerous #Google's plans are to restrict #Android sideloading to "verified developers" (that is, entities for which Google has full verified identity and associated information that they could hand over to authorities on demand).
This means that even though you own your Android device, you cannot install apps obtained from ANY source (except perhaps apps you build yourself that will only be permitted to run on your own device) unless Google knows pretty much everything about who created that app.
The ways that this could be abused are so numerous I won't even start listing them here, other than to note that it is absolutely horrific overreach by Google and at least appears to be Google bending over for abusive government demands, and could put already vulnerable individuals and groups at even more risk.
Absolutely disgusting.
L
Let me be really clear about how horrifically dangerous #Google's plans are to restrict #Android sideloading to "verified developers" (that is, entities for which Google has full verified identity and associated information that they could hand over to authorities on demand).
This means that even though you own your Android device, you cannot install apps obtained from ANY source (except perhaps apps you build yourself that will only be permitted to run on your own device) unless Google knows pretty much everything about who created that app.
The ways that this could be abused are so numerous I won't even start listing them here, other than to note that it is absolutely horrific overreach by Google and at least appears to be Google bending over for abusive government demands, and could put already vulnerable individuals and groups at even more risk.
Absolutely disgusting.
L
🔥7😭1
Forwarded from vx-underground
Lots of frustration in the malware analysis and reverse engineering community.
It's been discovered a DEFCON talk, presentation, and the code which coincided with it, was AI slop. The talk itself had hallucinated terminology which (apparently) no one at DEFCON noticed.
Bad.
It's been discovered a DEFCON talk, presentation, and the code which coincided with it, was AI slop. The talk itself had hallucinated terminology which (apparently) no one at DEFCON noticed.
Bad.
🥰4
Mira
kinda scary the possibilities with ai. the entry barrier is so low that you can pull up anything with a limited knowledge. lemme give you a scenario from my research: DarkHotel is an APT malware. it's a bit old (first identified around 2007). it specifically…
some stuff i've been tinkering with and even wilder predictions
- instead of relying on static code, malware could use machine learning models to analyze the environment it infects and modify its behavior accordingly (aka it's too much adaptive)
- automated malware creation. meaning creating polymorphic or metamorphic malware that changes its code structure frequently to avoid signature-based detection by antivirus software
- improved evasion techniques like evading sandboxing and behavioral analysis by detecting when it is running in a virtualized or monitored environment
- automated C2 infra and letting the ai handle everything dynamically
these are like the core components being altered. there could be more stuff one can do on top of this. it's becoming more advanced and targeting at the same time. wish someone simulated two agents one on the defense and the other on the offensive. this might give some clarity. most malware devs are some kinda boomers and i am pretty sure majority of them haven't embraced it yet. but the ai slop is real atp it's being used on the bigger stages. lots of stuff to weaponize. phew we will see how the lore goes💐
#meyapping
- instead of relying on static code, malware could use machine learning models to analyze the environment it infects and modify its behavior accordingly (aka it's too much adaptive)
- automated malware creation. meaning creating polymorphic or metamorphic malware that changes its code structure frequently to avoid signature-based detection by antivirus software
- improved evasion techniques like evading sandboxing and behavioral analysis by detecting when it is running in a virtualized or monitored environment
- automated C2 infra and letting the ai handle everything dynamically
these are like the core components being altered. there could be more stuff one can do on top of this. it's becoming more advanced and targeting at the same time. wish someone simulated two agents one on the defense and the other on the offensive. this might give some clarity. most malware devs are some kinda boomers and i am pretty sure majority of them haven't embraced it yet. but the ai slop is real atp it's being used on the bigger stages. lots of stuff to weaponize. phew we will see how the lore goes
#meyapping
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5
day ??? / ??? of waking up. have a great day y'all 💐
Please open Telegram to view this post
VIEW IN TELEGRAM
❤11
kitty has a reminder.
read the docs or consult some other resources before you augment/automate your coding flow. like how on earth someone populates something they don't even know what it does. i legit catch claude doing dumb stuff. so yeah don't bet on it, and always review the output💐
read the docs or consult some other resources before you augment/automate your coding flow. like how on earth someone populates something they don't even know what it does. i legit catch claude doing dumb stuff. so yeah don't bet on it, and always review the output
Please open Telegram to view this post
VIEW IN TELEGRAM
Mira
kitty has a reminder. read the docs or consult some other resources before you augment/automate your coding flow. like how on earth someone populates something they don't even know what it does. i legit catch claude doing dumb stuff. so yeah don't bet on it…
also, document the process in a file so that you can iterate faster the following day when you pick up where you left off. additionally, keep the design.json file for style-related elements to maintain the design guidelines throughout the process
👍1
i should add certified yapper and spammer on my résumé 😨
Please open Telegram to view this post
VIEW IN TELEGRAM
😁6