Readit News logoReadit News
Volundr commented on In the AI gold rush, tech firms are embracing 72-hour weeks   bbc.com/news/articles/cvg... · Posted by u/yladiz
bdangubic · 3 days ago
16 hours of work, 8 hours of sleep - this is what it should be. no PTO. salary don't matter cause you have no time to spend any of it. need to put in 65 years like this before you get the pension. utopia!
Volundr · 3 days ago
Pension? Why should you get paid not to work just because your 80 and have given your whole life to the company? Geez some people have no work ethic.
Volundr commented on Tell HN: Yet Another Round of Zendesk Spam    · Posted by u/Philpax
Volundr · 4 days ago
I'm up to several hundred. How is Zendesk this bad at email? Basic anti-abuse should be able to prevent this kind of flood. Simple rate limiting. God damn. For now I'm dropping everything with a Zendesk header. God help any non technical user whose a target.
Volundr commented on FBI is investigating Minnesota Signal chats tracking ICE   nbcnews.com/tech/internet... · Posted by u/duxup
Volundr · 15 days ago
The statement was made to point out that this is an example where a phone number is enough metadata to to problematic for privacy. It stands on its own. It doesn't need more context or purpose.

Deleted Comment

Deleted Comment

Volundr commented on White House defends sharing AI image showing arrested woman crying   bbc.co.uk/news/live/ce9yy... · Posted by u/petepete
yunwal · 19 days ago
> The image is AI, whether AI added a tiny cloud in the upper corner, or completely fabricated it from a prompt.

Your example shows two things that are obviously different from a moral standpoint. The first would not be news and the second would.

Volundr · 19 days ago
I mean agree to disagree I guess. If the government was modifying photos to make seemingly innocuous changes to the weather I would have a lot of questions as to why and would indeed hope that someone would report on it.
Volundr commented on Ask HN: How do you safely give LLMs SSH/DB access?    · Posted by u/nico
fhub · a month ago
Our solve is to allow it to work with a local dev database and it's output is a script. Then that script gets checked into version control (auditable and reviewed). Then that script can be run against production. Slower iteration but worth the tradeoff for us.

Giving LLM even read access to PII is a big "no" in my book.

On PII, if you need LLMs to work on production extracted data then https://github.com/microsoft/presidio is a pretty good tool to redact PII. Still needs a bit of an audit but as a first pass does a terrific job.

Volundr · a month ago
This. Everything your LLM reads from your database, server, whatever is being sent to your LLM provider. Unless your LLM is local running on your own systems, it shouldn't be given ANY access to production data without vetting it through legal with an eye to your privacy policy and compliance requirements.
Volundr commented on Never-before-seen Linux malware is "more advanced than typical"   arstechnica.com/security/... · Posted by u/Brajeshwar
reincarnate0x14 · a month ago
Even slightly higher barriers greatly reduces attempts, and the developers have much more practice at it. Rootkits and such for unix/linux have been around forever, but with VMs and containers getting recycled and such and long term expectations around impermanence and thus programmatically recreated and verifiable configurations, it's a lot harder to get something to stick without being found.

On top of that is the user interactivity model and software distribution model. For most non-admins the various protection schemes on Windows are a choice between "use my computer" and "don't use my computer" and thus basically meaningless. Plus there are fewer centrally managed repos because so much Windows software is hostile to being managed that way and large companies all have to build their own, and small organizations generally give up trying. Quick, hands-off integrity checks on linux can happen in the background and generally won't explode things.

Logging is a factor too. Windows logging tends to be "nothing" or "tsunami" with not a lot in between, and when log monitoring solutions charge by volume and analysts have to comb through oceans of noise to identify potentially dangerous activity, the end result is much less effective watchdogs. I've seen a lot of "Windows -> low cost log monitor doing filtering -> high cost log monitor that people actually look at" due to this, which is obviously harder to manage and less effective.

Most of this can be made the case for Windows, of course, but often isn't because getting Windows into a desired state is such a pain in the ass that it trains people into the "don't touch it, it's working!" mindset. Microsoft was making real strides towards this 20 years ago but their current product management has been security counterproductive IMHO. Doing things in the OS that look a lot like malware turns out to not be a good idea.

When we were developing attacks for unix environments it was often easier to go after the application deployment or CI chains than try to root the box unless there was a juicy SSHD or bash or whatever bug, which have been highly publicized are usually rapidly fixed without needing major effort from endpoint managers.

Volundr · a month ago
> Logging is a factor too. Windows logging tends to be "nothing" or "tsunami" with not a lot in between

You forgot mysterious GUID that shows up on exactly one forum post on the Internet with no solution.

u/Volundr

KarmaCake day4123August 15, 2013
About
[ my public key: https://keybase.io/whoops; my proof: https://keybase.io/whoops/sigs/V0McfypGi2_-ftJcjH550AXkiRKoesSTGFlszbAtxxM ]

me at waltonhoops.com

View Original