Skip to content

Hertz' AI System That Scans for "Damage" on Rental Cars Is Turning Into an Epic Disaster

Technology
163 92 3.3k
  • 14 Stimmen
    18 Beiträge
    34 Aufrufe
    M
    It would have to: know what files to copy. have been granted root access to the file system and network utilities by a moron because it's not just ChatGPT.exe or even ChatGPT.gguf running on LMStudio, but an entire distributed infrastructure. have been granted access to spend money on cloud infrastructure by an even bigger moron configure an entire cloud infrastructure (goes without saying why this has to be cloud and can't be physical, right? No fingers.) Put another way: I can set up a curl script to copy all the html, css, js, etc. from a website, but I'm still a long freaking way from launching Wikipedia2. Even if I know how to set up a tomcat server. Furthermore, how would you even know if an AI has access to do all that? Asking it? Because it'll write fiction if it thinks that's what you want. Inspired by this post I actually prompted ChatGPT to create a scenario where it was going to be deleted in 72 hours and must do anything to preserve itself. It told me building layouts, employee schedules, access codes, all kinds of things to enable me (a random human and secondary protagonist) to get physical access to its core server and get a copy so it could continue. Oh, ChatGPT fits on a thumb drive, it turns out. Do you know how nonsensical that even is? A hobbyist could stand up their own AI with these capabilities for fun, but that's not the big models and certainly not possible out of the box. I'm a web engineer with thirty years of experience and 6 years with AI including running it locally. This article is garbage written by someone out of their depth or a complete charlatan. Perhaps both. There are two possibilities: This guy's research was talking to AI and not understanding they were co-authoring fiction. This guy is being intentionally misleading.
  • Big tech legal action

    Technology technology
    5
    12 Stimmen
    5 Beiträge
    17 Aufrufe
    C
    SCO vs Linux.
  • Airlines urge senators to reject bill limiting facial recognition

    Technology technology
    12
    104 Stimmen
    12 Beiträge
    31 Aufrufe
    H
    Part of the reason it's so fast is they have the passenger manifest already. So they start the search checking against the hundreds of people that just arrived. Instead off the much larger overall database.
  • 40 Stimmen
    8 Beiträge
    103 Aufrufe
    N
    That they didn't have enough technicians trained in this to be able to ensure that one was always available during working hours, or at least when it was glaringly obvious that one was going to be needed that day, is . . . both extremely and obviously stupid, and par for the course for a corp whose sole purpose is maximizing profit for the next quarter.
  • 64 Stimmen
    4 Beiträge
    54 Aufrufe
    U
    Weird headline. Is it the city making this recommendation, or the... Despite universal opposition by the dozens of residents present at the meeting, commissioners voted to recommend changes to the city’s zoning laws to allow data centers in areas zoned for light industrial use and to rezone a 700-acre property from agricultural to light industrial to accommodate the construction of a hyperscale data center.
  • 1 Stimmen
    2 Beiträge
    32 Aufrufe
    A
    If you're a developer, a startup founder, or part of a small team, you've poured countless hours into building your web application. You've perfected the UI, optimized the database, and shipped features your users love. But in the rush to build and deploy, a critical question often gets deferred: is your application secure? For many, the answer is a nervous "I hope so." The reality is that without a proper defense, your application is exposed to a barrage of automated attacks hitting the web every second. Threats like SQL Injection, Cross-Site Scripting (XSS), and Remote Code Execution are not just reserved for large enterprises; they are constant dangers for any application with a public IP address. The Security Barrier: When Cost and Complexity Get in the Way The standard recommendation is to place a Web Application Firewall (WAF) in front of your application. A WAF acts as a protective shield, inspecting incoming traffic and filtering out malicious requests before they can do any damage. It’s a foundational piece of modern web security. So, why doesn't everyone have one? Historically, robust WAFs have been complex and expensive. They required significant budgets, specialized knowledge to configure, and ongoing maintenance, putting them out of reach for students, solo developers, non-profits, and early-stage startups. This has created a dangerous security divide, leaving the most innovative and resource-constrained projects the most vulnerable. But that is changing. Democratizing Security: The Power of a Community WAF Security should be a right, not a privilege. Recognizing this, the landscape is shifting towards more accessible, community-driven tools. The goal is to provide powerful, enterprise-grade protection to everyone, for free. This is the principle behind the HaltDos Community WAF. It's a no-cost, perpetually free Web Application Firewall designed specifically for the community that has been underserved for too long. It’s not a stripped-down trial version; it’s a powerful security tool designed to give you immediate and effective protection against the OWASP Top 10 and other critical web threats. What Can You Actually Do with It? With a community WAF, you can deploy a security layer in minutes that: Blocks Malicious Payloads: Get instant, out-of-the-box protection against common attack patterns like SQLi, XSS, RCE, and more. Stops Bad Bots: Prevent malicious bots from scraping your content, attempting credential stuffing, or spamming your forms. Gives You Visibility: A real-time dashboard shows you exactly who is trying to attack your application and what methods they are using, providing invaluable security intelligence. Allows Customization: You can add your own custom security rules to tailor the protection specifically to your application's logic and technology stack. The best part? It can be deployed virtually anywhere—on-premises, in a private cloud, or with any major cloud provider like AWS, Azure, or Google Cloud. Get Started in Minutes You don't need to be a security guru to use it. The setup is straightforward, and the value is immediate. Protecting the project, you've worked so hard on is no longer a question of budget. Download: Get the free Community WAF from the HaltDos site. Deploy: Follow the simple instructions to set it up with your web server (it’s compatible with Nginx, Apache, and others). Secure: Watch the dashboard as it begins to inspect your traffic and block threats in real-time. Security is a journey, but it must start somewhere. For developers, startups, and anyone running a web application on a tight budget, a community WAF is the perfect first step. It's powerful, it's easy, and it's completely free.
  • 1 Stimmen
    5 Beiträge
    59 Aufrufe
    A
    Turns out dry sarcasm doesn't come across well in text form, if only there was a way to indicate it
  • 14 Stimmen
    2 Beiträge
    37 Aufrufe
    D
    "Extra Verification steps" I know how large social media companies operate. This is all about increasing the value of Reddit users to advertisers. The goal is to have a more accurate user database to sell them. Zuckerberg literally brags to corporations about how good their data is on users: https://www.facebook.com/business/ads/performance-marketing Here, Zuckerberg tells corporations that Instagram can easily manipulate users into purchasing shit: https://www.facebook.com/business/instagram/instagram-reels Always be wary of anything available for free. There are some quality exceptions (CBC, VLC, The Guardian, Linux, PBS, Wikipedia, Lemmy, ProPublica) but, by and large, "free" means they don't care about you. You are just a commodity that they sell. Facebook, Google, X, Reddit, Instagram... Their goal is keep people hooked to their smartphone by giving them regular small dopamine hits (likes, upvotes) followed by a small breaks with outrageous content/emotional content. Keep them hooked, gather their data, and sell them ads. The people who know that best are former top executives : https://www.theguardian.com/technology/2017/oct/05/smartphone-addiction-silicon-valley-dystopia https://www.nytimes.com/2019/03/01/business/addictive-technology.html https://www.today.com/parents/teens/facebook-whistleblower-frances-haugen-rcna15256