Skip to content

OpenAI's annualized revenue hits $10 billion, up from $5.5 billion in December 2024

Technology
19 12 44
  • 83 Stimmen
    3 Beiträge
    4 Aufrufe
    I
    Facial recognition hates jugalos and adversarial clothing patterns
  • How LLMs could be insider threats

    Technology technology
    12
    1
    105 Stimmen
    12 Beiträge
    46 Aufrufe
    patatahooligan@lemmy.worldP
    Of course they're not "three laws safe". They're black boxes that spit out text. We don't have enough understanding and control over how they work to force them to comply with the three laws of robotics, and the LLMs themselves do not have the reasoning capability or the consistency to enforce them even if we prompt them to.
  • Founder of 23andMe buys back company out of bankruptcy auction

    Technology technology
    60
    1
    348 Stimmen
    60 Beiträge
    106 Aufrufe
    A
    Come on up to Canada, we still got that garlic bomb. I can still taste the one from last week
  • Science and Technology News and Commentary: Aardvark Daily

    Technology technology
    2
    7 Stimmen
    2 Beiträge
    13 Aufrufe
    I
    What are you on about with this? Last news post 2013?
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    33 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • How a Spyware App Compromised Assad’s Army

    Technology technology
    2
    1
    41 Stimmen
    2 Beiträge
    15 Aufrufe
    S
    I guess that's why you pay your soldiers. In the early summer of 2024, months before the opposition launched Operation Deterrence of Aggression, a mobile application began circulating among a group of Syrian army officers. It carried an innocuous name: STFD-686, a string of letters standing for Syria Trust for Development. ... The STFD-686 app operated with disarming simplicity. It offered the promise of financial aid, requiring only that the victim fill out a few personal details. It asked innocent questions: “What kind of assistance are you expecting?” and “Tell us more about your financial situation.” ... Determining officers’ ranks made it possible for the app’s operators to identify those in sensitive positions, such as battalion commanders and communications officers, while knowing their exact place of service allowed for the construction of live maps of force deployments. It gave the operators behind the app and the website the ability to chart both strongholds and gaps in the Syrian army’s defensive lines. The most crucial point was the combination of the two pieces of information: Disclosing that “officer X” was stationed at “location Y” was tantamount to handing the enemy the army’s entire operating manual, especially on fluid fronts like those in Idlib and Sweida.
  • This Month in Redox - May 2025

    Technology technology
    1
    21 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • 0 Stimmen
    1 Beiträge
    9 Aufrufe
    Niemand hat geantwortet