• 3 Posts
  • 105 Comments
Joined 2 years ago
cake
Cake day: March 4th, 2024

help-circle



  • Yes. The relevant points are that Catfriend’s repo was fully reset, no git history, multiple times this year, supposedly because of sensitive data that was mistakenly checked in. If that’s the case, it might explain why shortly before Catfriend deleted his repo, he created an issue saying something along the lines of ‘stop messing with my desktop’, which could be read as a plea to hackers. The repo went dark, and someone else published it, with Catfriend’s private signing key, which triggered automatic updates for some users, without them knowing the maintainer changed. They also claim to have Catfriend’s github credentials. After staying quiet for a month, Catfriend recently posted on the syncthing forum saying that everything is dandy with the new maintainer, without addressing major concerns. Meanwhile, the new maintainer has made large changes to the codebase without public comments. The last two updates from the new maintainer have been reviewed independently, and reproducible builds are enabled to ensure the apk matches the sources. However, that is assuming that Catfriend’s repo was safe to begin with. In the case of ongoing blackmail, malicious code could have been added during one of the repository resets, or in a large refactor commit.

    The sad part is that Catfriend picked up this repo after Syncthing deprecated it, just for his friends and family. I don’t think he is a professional developer, and he very obviously was overwhelmed by the project. Syncthing is a very juicy target for malicious state actors, and trust is crucial. I feel awful to say that I no longer trust Catfriend or his replacement, but the circumstances don’t inspire confidence.


  • I suggest framing the blog post this way. The way it reads now is like you’re actually suggesting this to other small instance admins. I think it’s OK to play around with new tools, but the article is not self aware in this respect.

    EDIT: it’s also comes off like, oh no one silly keystroke nuked my setup, but from an outside perspective, of course it did, it was a house of cards. I think a better framing would be that you dug a large hole for yourself by trying to force enterprise level complexity into a one-person project, and through sheer perseverance it somehow is still alive, but maybe some different architectural decisions early on could have avoided this.




  • Noooo this is possibly the worst case I’ve seen of why the fuck did you complicate things this much?? I blame Claude/Cursor mostly for this one, it seems they steered a lot of the design decisions. Seriously though, if you think you need a bare bones kubernetes setup on 3 small hetzner vpses, only two of which being worker nodes, with a grand total 16gb of RAM, to support fedi instances with around about a single user… Stop. Just stop it already. I obviously feel bad that everything crashed down on them, but if they had taken the time to actually talk to other small instance maintainers, they could’ve spent more time doing proper backup and recovery than messing around with, and I shit you not, I counted 11 unique tools. Nobody needs 11 monitoring, containerization, volume management, dns tools, fucking cloudflare?? To run a single user instance.






  • The Toledo Strip is in the picture, but the reason this got fucked up in the first place is actually Indiana just demanding Congress give them access to Lake Michigan, a couple decades before the war. If Indiana didn’t have access to the lake federally recognized, the Toledo Strip dispute would have extended all the way across Michigan’s border, because it was based on competing surveys.

    EDIT: I should clarify for everyone who isn’t in the picture, Indiana is the lower left state that touches the lake in its northwest corner. Ohio, bottom right, actually ‘won’ the war and contains the Toledo Strip, and that actually made the jagged edge less fucked up, but Michigan got a giant mountain full of iron as a compromise, which is why all of America’s early car manufacturers ended up in Detroit, making it a city.








  • This looks like a design decision to avoid running elevated programs. I would like to see the experiment done with another admin ability that doesn’t directly ‘threaten’ the llm, like uninstalling or installing random software, toggling network or vpn connections, restarting services etc. What the researchers call ‘sabotage’, it is literally the llm echoing “the computer would shut down here if this was for real, but you didn’t specifically tell me I might shutdown so I’ll avoid actually doing it.” And when a user tells it “it’s OK to shutdown if told to”, it mostly seems to comply, except for Grok. It seems that this restriction on the models overrides any system prompt though, which makes sense because sometimes the user and the author of the system prompt are not the same person.