Mira – Telegram
Mira
747 subscribers
825 photos
25 videos
20 files
267 links
sporadic attempts at life.
personal channel

files: @mira_files
playlist: @the_coding_playlist
Download Telegram
"Sideloading" is the rentseeker word for "being able to run software of your choosing on a computing device you purchased". There is no reasonable case for an operating system developer having a say over what programs you run on your hardware.

#Android #Google
***** Google's plans to restrict sideloading on Android are an authoritarian wet dream come true *****

Let me be really clear about how horrifically dangerous #Google's plans are to restrict #Android sideloading to "verified developers" (that is, entities for which Google has full verified identity and associated information that they could hand over to authorities on demand).

This means that even though you own your Android device, you cannot install apps obtained from ANY source (except perhaps apps you build yourself that will only be permitted to run on your own device) unless Google knows pretty much everything about who created that app.

The ways that this could be abused are so numerous I won't even start listing them here, other than to note that it is absolutely horrific overreach by Google and at least appears to be Google bending over for abusive government demands, and could put already vulnerable individuals and groups at even more risk.

Absolutely disgusting.

L
🔥7😭1
💐
Anonymous Poll
65%
stickers
35%
skin
eligible bachelor
🔥4
Forwarded from vx-underground
Lots of frustration in the malware analysis and reverse engineering community.

It's been discovered a DEFCON talk, presentation, and the code which coincided with it, was AI slop. The talk itself had hallucinated terminology which (apparently) no one at DEFCON noticed.

Bad.
🥰4
Mira
kinda scary the possibilities with ai. the entry barrier is so low that you can pull up anything with a limited knowledge. lemme give you a scenario from my research: DarkHotel is an APT malware. it's a bit old (first identified around 2007). it specifically…
some stuff i've been tinkering with and even wilder predictions

- instead of relying on static code, malware could use machine learning models to analyze the environment it infects and modify its behavior accordingly (aka it's too much adaptive)

- automated malware creation. meaning creating polymorphic or metamorphic malware that changes its code structure frequently to avoid signature-based detection by antivirus software

- improved evasion techniques like evading sandboxing and behavioral analysis by detecting when it is running in a virtualized or monitored environment

- automated C2 infra and letting the ai handle everything dynamically

these are like the core components being altered. there could be more stuff one can do on top of this. it's becoming more advanced and targeting at the same time. wish someone simulated two agents one on the defense and the other on the offensive. this might give some clarity. most malware devs are some kinda boomers and i am pretty sure majority of them haven't embraced it yet. but the ai slop is real atp it's being used on the bigger stages. lots of stuff to weaponize. phew we will see how the lore goes 💐
#meyapping
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5
God bless svelte
day ??? / ??? of waking up. have a great day y'all 💐
Please open Telegram to view this post
VIEW IN TELEGRAM
11
old Lecrae songs 🎧
Please open Telegram to view this post
VIEW IN TELEGRAM
💯7
used to be a boomer 🥺
Please open Telegram to view this post
VIEW IN TELEGRAM
😁6
15
jemo 😭
#shot
Please open Telegram to view this post
VIEW IN TELEGRAM
6👎1
kitty has a reminder.
read the docs or consult some other resources before you augment/automate your coding flow. like how on earth someone populates something they don't even know what it does. i legit catch claude doing dumb stuff. so yeah don't bet on it, and always review the output 💐
Please open Telegram to view this post
VIEW IN TELEGRAM
Mira
kitty has a reminder. read the docs or consult some other resources before you augment/automate your coding flow. like how on earth someone populates something they don't even know what it does. i legit catch claude doing dumb stuff. so yeah don't bet on it…
also, document the process in a file so that you can iterate faster the following day when you pick up where you left off. additionally, keep the design.json file for style-related elements to maintain the design guidelines throughout the process
👍1
i should add certified yapper and spammer on my résumé 😨
Please open Telegram to view this post
VIEW IN TELEGRAM
😁6
Forwarded from ForwardingServiceRepositoryImpl (Archive)
https://news.1rj.ru/str/gugutlogs/1393

exactly a year and 10 days before, me and freab defended our project. and Robi was in georgia, babi was having fun watching movies, Logos and Saka were still complaining about class, Hope was 3rd year I guess, Meron used to be much active, Nati had an M3 mac I guess, Dave used to have a channel, and Kinfish was talking with beka about better auth, Doughnut was in the process of drafting Exam buddy, brooksolo didn't have a youtube channel, Eyos was doing flubber dev I think, Keti was almost totally offline, Eldad was a shmoll (still is) Mira and Kirakos were not tagged as a scam, Eyuel used to be more active...

this is all I remember. if I forgot, comment your status below. time flies bros
y'all it's sunny outside... well for now.
have a blessed day 💐
#shot
Please open Telegram to view this post
VIEW IN TELEGRAM
8