- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
This just in: Elon is a fraud and has no idea what he’s doing. More at 10.
Anyone working in software development should be aware that the employment contract most probably contains a non-disclosure clause that forbids to hand business secrets like source code to outsiders, or worse, competitors.
In my company they see OpenAI ond others the same way they see Github or Atlassian, so I think this line is getting a bit blurrier
The line is as sharp as ever. Everybody just ignores it.
this is basically
“see if your credit card has been hacked by entering it below!“
I get the same vibes from https://haveibeenpwned.com/Passwords
I know the site is made by a security researcher but still. It doesn’t feel completely safe to give then my passwords.
Except you’re not
https://haveibeenpwned.com/API/v3#PwnedPasswords
Your computer is basically sending a part of your password (the first five characters of a hash) and if the server responds positively to a match it sends all the other possible combinations and your computer looks to see if it matches the rest based on when you typed.
For more information
https://en.wikipedia.org/wiki/K-anonymity
It’s always good to be cautious, but it’s especially important to know how tech works, especially good tech, when it can have immense benefit
That is the correct way of thinking, never trust anything with your passwords.
I was curious on what haveibeenpwned does, so I took a look at what the network tab in dev tools said what was actually sent. When I type a password (say password123) and press check it runs a function that hashes with the “SHA-1” hash function and then sends the first 5 characters of the result. The response is over a thousand lines in the format of
35 hash characters:number of breaches
If any of these hashes are the start of your original hash, you now know it’s exposed and how many times it’s been exposed.
While I get your concern. I, and loads of other nerds, trust them.
I wouldn’t recommend providing any current passwords, but it could be used to determine any recent/previous compromises.
Firstly… no.
Secondly… cut and paste? Not copy?
If you are a true believer you only cut and paste, deploy afterwards without checking.
For one brief, terrifying moment, the source code of my life’s work existed only in Groks memory.
Mr. Anderson.
Happy cake day!
Obviously, because you need to empty your “source code file” to make room for Grok’s corrected code.
Dude, copying source code files is most probably against the NDA
not even masking that they just want
to stealyou to give them all your code.yes, so u can replace it right away with groks “fixed” version ofc 😊
Now with 50% more Hitler!
This is the guy who doesn’t own a laptop remember… he may not know the difference, or maybe his lawyer was lying.
I was wide-eyed at this, and then I realized that I don’t own a laptop either! I have owned a few, but after my last one died 5+ years ago I’ve just been using my 10 year old desktop computer which doubles as a home server. I do have a work laptop, but I don’t own it.
We’ll to be fair they said he doesn’t use a computer. So both your old desktop and your work computer I would count as computers you used. I should have worded it more accurately
Wait what, Melon?
A letter his lawyers sent in his defense.
“Plaintiffs sent Defendants a letter informing them that Plaintiffs were conducting searches of Mr. Musk’s mobile phone, having searched his emails, and that Mr. Musk does not use a computer,” the filing reads.
copypasta
Theoretically, cutting and pasting a file into your browser will just act like copy–pasting, but that’s still a dumb way to phrase it.
Now, take the code for AI and paste that in. It does not work? Then AI is no good.
P and NP.
yeah let me just give all of my code to elon for free
Hey man how is poor Elon going to make money if people don’t give him free shit? Just think of the billionaires.
Ah yes, “fix” it for “free”
“Cut & paste” and not “copy and paste” because if you cut it, you won’t have a copy of it anymore and your code is now Grok’s code.
“Will you walk into my parlour?” said a spider to a fly…
l33t h4x0r
H3 1z d4 1 =o
Set aside the cut n paste, what exactly would the Grokanical Türk “fix”?
The comments in your code being too woke
Error 608: Insufficient Hitler
Remove all state machine implementations because they support transitions.
I keep seeing claims that grok is a “mechanical Turk”, but searching turns up nothing. What evidence is there of this?
I think it’s just a joke, as we’ve seen many AI projects are just Indians.
Evidence of what?
Of being a person responding instead of an llm.
Yeah it seems pretty unlikely that any AI chat bots are manipulating code in the complex (whether the output is correct or not is immaterial to the complexity of the changes being made) ways that they are that quickly despite actually being done by humans.