Readit News logoReadit News
eliya_confiant commented on Claude 3 model family   anthropic.com/news/claude... · Posted by u/marc__1
simonw · 2 years ago
That is a brilliant hack! Thanks for sharing. Any chance you could post a screenshot of the Automator workflow somewhere - I'm having trouble figuring out how to reproduce (my effort so far is here: https://gist.github.com/simonw/d3c07969a522226067b8fe099007f...)
eliya_confiant · 2 years ago
I added some notes to the gist.
eliya_confiant commented on Claude 3 model family   anthropic.com/news/claude... · Posted by u/marc__1
simonw · 2 years ago
I just released a plugin for my LLM command-line tool that adds support for the new Claude 3 models:

    pipx install llm
    llm install llm-claude-3
    llm keys set claude
    # paste Anthropic API key here
    llm -m claude-3-opus '3 fun facts about pelicans'
    llm -m claude-3-opus '3 surprising facts about walruses'
Code here: https://github.com/simonw/llm-claude-3

More on LLM: https://llm.datasette.io/

eliya_confiant · 2 years ago
Hi Simon,

Big fan of your work with the LLM tool. I have a cool use for it that I wanted to share with you (on mac).

First, I created a quick action in Automator that recieves text. Then I put together this script with the help of ChaptGPT:

        escaped_args=""
        for arg in "$@"; do
          escaped_arg=$(printf '%s\n' "$arg" | sed "s/'/'\\\\''/g")
          escaped_args="$escaped_args '$escaped_arg'"
        done

        result=$(/Users/XXXX/Library/Python/3.9/bin/llm -m gpt-4 $escaped_args)

        escapedResult=$(echo "$result" | sed 's/\\/\\\\/g' | sed 's/"/\\"/g' | awk '{printf "%s\\n", $0}' ORS='')
        osascript -e "display dialog \"$escapedResult\""
Now I can highlight any text in any app and invoke `LLM` under the services menu, and get the llm output in a nice display dialog. I've even created a keyboard shortcut for it. It's a game changer for me. I use it to highlight terminal errors and perform impromptu searches from different contexts. I can even prompt LLM directly from any text editor or IDE using this method.

eliya_confiant commented on Ask HN: Side projects that are making money, but you'd not talk about them?    · Posted by u/CodeSgt
perlin · 3 years ago
I run the infrastructure (k8s+helm on GCP) for a PoS validator of a top 50 crypto project. My client is a big whale who bonded ~$15.6M at the projects all-time high. It’s about 1-2 hours of work per month and my 10% cut of the rewards nets me anywhere from $4k-$40k/mo. depending on the price. Given the fact that crypto is in the gutter now I haven’t been selling any to USD, but it’s a nice way to stack an asset with high upside potential while doing very little work.
eliya_confiant · 3 years ago
Is it POKT?
eliya_confiant commented on “Crypto drainer” template facilitates theft   blog.confiant.com/how-one... · Posted by u/eliya_confiant
koprulusector · 3 years ago
I am honestly mind blown that a scam tool like this isn’t minified and uglified to obfuscate reverse engineering. The process also strips comments, which I imagine would’ve been a preference of the perpetrator.

I assume the example from the author [of the blog post] must’ve been a deployment by someone without much experience with the javascript ecosystem or extremely lazy. Pretending this assumption is correct, what does it tell us? Is it a reflection of the environment’s lack of regulation (even industry/market led, like PCI) and a deluge of unsophisticated (ignorant) users/consumers?

eliya_confiant · 3 years ago
Hi, author here. I liked this comment a lot and I can help to shed some light:

We do see phishing pages like this increasingly popping up with obfuscation. I think at this time less than a third are obfuscated, but this is gradually increasing. The thing is, most of the folks running these sites are likely not very technical. They buy the template from a vendor and plug in the config settings and just focus on driving traffic to the site - this happens through Discord & Twitter spam.

The thing with fraudsters and threat actors that play in this space is that at the end of the day it's a business and they want maximum reward for minimal effort. I think right now there's not a very aggressive takedown feedback loop with these phishing sites, but we are working to accelerate this and as this happens the perpetrators WILL need to rely more on obfuscation to try and thwart on the fly static detection. My guess is that eventually most of the logic will be server-side and cloaked as has happened with many other categories of phishing and fraud (particularly malvertising campaigns). Sooner or later the more amateur scam operators in this space will likely get shaken out by this acceleration of the cat and mouse game and only highly technical operators will be left.

With regards to the sites that we see obfuscated today, we are still able to do accurate attribution, as we've been specializing in the detection and blocking malicious client-side code for some time now.

Thanks again for your comment.

eliya_confiant commented on Steganography Based Ad Payload That Drops Shlayer Trojan on Mac Users   blog.confiant.com/confian... · Posted by u/saidajigumi
callinyouin · 7 years ago
Seems like an odd method, but I believe that is how they are specifically targeting macOS machines for this particular malware.
eliya_confiant · 7 years ago
That's correct. It's just a subtle way of doing OS fingerprinting.
eliya_confiant commented on Steganography Based Ad Payload That Drops Shlayer Trojan on Mac Users   blog.confiant.com/confian... · Posted by u/saidajigumi
account0099099 · 7 years ago
Does anyone have an answer to this question?
eliya_confiant · 7 years ago
The user still needs to go through with the fake Flash update. Even if one is to accidentally fat finger the download, they still have to proceed with the installation. To protect yourself, please be vigilant and only accept software updates directly from the vendor of the software you are using. This is more of a phishing attack to get folks to install malware / adware.
eliya_confiant commented on Steganography Based Ad Payload That Drops Shlayer Trojan on Mac Users   blog.confiant.com/confian... · Posted by u/saidajigumi
sourthyme · 7 years ago
Why aren't these ad scripts sandboxed? I thought you can't have arbitrary code from cross site domains have access.
eliya_confiant · 7 years ago
The industry is moving in a direction where more and more ads will be sandboxed, we are just not there quite yet.

u/eliya_confiant

KarmaCake day189January 24, 2019View Original