drspod

joined 3 years ago
[–] drspod@lemmy.ml 5 points 1 week ago

LLM's produce fan-fiction of reality.

[–] drspod@lemmy.ml -4 points 1 week ago

In this case, it's just preaching to the choir. The purpose of an allegory is usually to present a convincing argument to people who are as yet unconvinced, by presenting the argument from a different point of view that they haven't considered.

[–] drspod@lemmy.ml 7 points 1 week ago (2 children)

Is it just the “Substack hosts fascist blogs so everyone using Substack is fascist by association” thing?

Is that not enough for you?

[–] drspod@lemmy.ml -4 points 1 week ago (6 children)

I don't think this is really a very good allegory. The author has written 835 words and only managed to express that:

  • blue food tastes kind of weird
  • they're putting it in everything
  • they're putting up the prices of blue food
  • you can't get normal food even if you want it

It's not surprising to me that some people didn't get that it was about AI.

The allegory would work better if:

  • production of blue food colouring took so much energy that they were bringing coal power plants back online and exacerbating climate change
  • in order to design the blue food colouring, they had to steal every person's recipe books without permission and regardless of how private that information might be to the owner
  • the blue food colouring could spontaneously make a food taste almost like someone's personal family recipe without their permission
  • foods containing the blue food colouring completely lack any expected nutritional content, and when a blue food does contain nutrition it's just a random accident of the process
  • scientific studies of people eating exclusively blue foods show that not only are they malnourished, but their body can no longer process normal foods as efficiently as before.

To make these points, I think the metaphor needs to be something a little bit more complex than "blue food colouring." Perhaps food made by a food replicator would make for a better example.

[–] drspod@lemmy.ml 8 points 1 week ago (1 children)

Already widely used in the western world

Really?

[–] drspod@lemmy.ml 20 points 2 weeks ago

It's the kind of tent that's a semi-permanent structure and you rent it like a cabin.

[–] drspod@lemmy.ml 6 points 2 weeks ago (1 children)

From the sidebar:

If possible, when submitting please delete the “m.” from “en.m.wikipedia.org”. This will ensure people clicking from desktop will get the full Wikipedia website.

[–] drspod@lemmy.ml 14 points 2 weeks ago (1 children)

The Italian Job (1969)

[–] drspod@lemmy.ml 22 points 2 weeks ago (1 children)

His mistake was not driving a Mini Cooper.

[–] drspod@lemmy.ml 57 points 2 weeks ago (11 children)

Imagine not being American and having to read about the American soap opera in your technology community and everywhere else.

[–] drspod@lemmy.ml 3 points 2 weeks ago

Don't get high on your own supply.

[–] drspod@lemmy.ml 6 points 2 weeks ago (1 children)

This forbes blog is about this article:

https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/

The only silver lining here is that all of the datasets were exposed only briefly: long enough for researchers to uncover them, but not long enough to find who was controlling vast amounts of data. Most of the datasets were temporarily accessible through unsecured Elasticsearch or object storage instances.

So there isn't really an explanation other than "somebody collected these somehow and left the data unsecured."

The attack vector for infostealer malware is usually social engineering, getting unwary users to download infected trojanized software via phishing and malvertising etc.

If you follow security news, you will see articles about infostealer malware campaigns all the time.

https://www.theregister.com/2025/06/18/minecraft_mod_malware/

https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html

https://thehackernews.com/2025/06/rust-based-myth-stealer-malware-spread.html

https://thehackernews.com/2025/05/eddiestealer-malware-uses-clickfix.html

view more: ‹ prev next ›