Skip to content

AI agents wrong ~70% of time: Carnegie Mellon study

Technology
278 108 123
  • 88 Stimmen
    8 Beiträge
    3 Aufrufe
    paraphrand@lemmy.worldP
    Y’all got any of that federation?
  • PSA: Stop Using These Fire-Prone Anker Power Banks Right Now

    Technology technology
    56
    1
    357 Stimmen
    56 Beiträge
    189 Aufrufe
    Y
    Agreed here. Frequently people charge these near where they sleep and the failure mode is... sudden. Couches and beds tend to be really good kindling too. Urgency in this case is probably warranted.
  • 419 Stimmen
    113 Beiträge
    94 Aufrufe
    D
    Hiroshima and Nagasaki is currently livable because the bomb was detonated in the sky, the radiation disappates quickly. In constrast, Chernobyl had much more fuel and since the power plant was on the ground, it contaminated a lot of the soil, therefore, it's gonna take much much longer before Chernobyl is ever livable again. A tactical nuke is a bomb that will detonate in the air, and since its "tactical", its gonna have much less yield. Its gonna be become livable again even quickly than Hiroshima and Nagasaki.
  • 894 Stimmen
    134 Beiträge
    440 Aufrufe
    Y
    Yup, but the control mechanisms are going to shit, because it sounds like they are going to maybe do a half assed rollout
  • Why Decentralized Social Media Matters

    Technology technology
    45
    1
    388 Stimmen
    45 Beiträge
    153 Aufrufe
    fizz@lemmy.nzF
    Yeah we're kinda doing well. Retaining 50k mau from the initial user burst is really good and Lemmy was technologically really bad at the time. Its a lot more developed today. I think next time reddit fucks uo we spike to over 100k users and steadily grow from there.
  • 17 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    8 Beiträge
    36 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 0 Stimmen
    2 Beiträge
    16 Aufrufe
    V
    Here's how you know it's not ready: AI hasn't replaced a single CEO.