Need to let loose a primal scream without collecting footnotes first? Have a sneer percolating in your system but not enough time/energy to make a whole post about it? Go forth and be mid: Welcome to the Stubsack, your first port of call for learning fresh Awful you’ll near-instantly regret.

Any awful.systems sub may be subsneered in this subthread, techtakes or no.

If your sneer seems higher quality than you thought, feel free to cut’n’paste it into its own post — there’s no quota for posting and the bar really isn’t that high.

The post Xitter web has spawned soo many “esoteric” right wing freaks, but there’s no appropriate sneer-space for them. I’m talking redscare-ish, reality challenged “culture critics” who write about everything but understand nothing. I’m talking about reply-guys who make the same 6 tweets about the same 3 subjects. They’re inescapable at this point, yet I don’t see them mocked (as much as they should be)

Like, there was one dude a while back who insisted that women couldn’t be surgeons because they didn’t believe in the moon or in stars? I think each and every one of these guys is uniquely fucked up and if I can’t escape them, I would love to sneer at them.

(Semi-obligatory thanks to @dgerard for starting this)

You are viewing a single thread.
View all comments
15 points
*

Ok this might be a bit petty of me but, yes this HN comment right here officer.

A group pwns an entire TLD with a fair amount of creativity, and this person is like (paraphrasing) “if you think that’s bad news just wait until you hear AIs can find trivial XSS and SQL injections 😱”.

Aside: have I ever mentioned here that you should really stick with .com / .net / .org / certain country domains? Because this sort of stuff is exactly why. Awful.systems can get a pass since the domain name is just that good.

permalink
report
reply
6 points

Fuck it, we’re going back to bang paths. ficix!hetzner!awful!self please add support for this.

permalink
report
parent
reply
4 points

you have no idea how much I’ve been tempted to do UUCP

permalink
report
parent
reply
6 points

I liked this comment on the HN post:

Our computer security analogies are modeled around securing a home from burglars, but the actual threat model is the ocean surging 30 feet onto our beachfront community. The ocean will find the holes, no matter how small. We are not prepared for this.

permalink
report
parent
reply
10 points

the original post is fucking amazing

here in the future, nothing fucking works

permalink
report
parent
reply
5 points
*

.mobi? They became the admins of the file format? And they paid for it? Good luck with that. ;)

E: me after reading the article. Ow god nothing fucking works indeed, that is dire. I actually checked the date to see if this wasn’t some old post. Nope 9/11 2024. Buffer overflow + lapsed domains.

permalink
report
parent
reply
12 points

Awful.systems can get a pass since the domain name is just that good.

a new source of anxiety has formed

in all seriousness, a backup domain name might not be the worst idea one day. I don’t think Lemmy’s federation particularly likes being ripped out of one FQDN and migrated to another, but it’s probably preferable to shutting down cause the owners of our TLD thoroughly shit the bed

permalink
report
parent
reply
7 points
*

awful’s probably okay, .systems is run by Donuts and they’re one of the bigger operations around

pro-tip: do not learn things about how TLDs work (and I mean the bit beyond dns architecture), it is cursed knowledge you can’t unlearn

and with that warning delivered, y’all may freely run to hyperfocus on this, and realize too late it’s a gateway drug

regarding backup domain: yeah always handy to have something, but nfi how to port it. AP’s identity design there really leaves something to be desired :/

(e: good lord I was out of it when I wrote this post)

permalink
report
parent
reply
13 points
*

quoted because this is fucking gold and paraphrasing isn’t doing it:

Do you have any references/examples of this?

tons

rapid7 for example use LLMs to analyze code and identify vulnerabilities such as SQL injection, XSS, and buffer overflows.

Can you point me to a blog or feature of them that does this? I used to work at R7 up until last year and there was none of this functionality in their products at the time and nothing on the roadmap related to this.

must’ve been another company then which i got confused with the name

Good thing you have tons of examples.

Right?

e: you’ll never guess what a bunch of DEI Steve’s other posts are about

permalink
report
parent
reply
8 points

I wonder if he got standard ML and LLM confused. (I did hear there was some usage of LLM/ML to help with some documentation stuff I think on a riskybusiness podcast, but I would have to relisten for the details. It could also just have been promotional stuff, while they are not actually using it).

Poor DeiSteve, it always sucks when you have a decades old username which suddenly takes up political meaning.

“created: 51 days ago”

Oh no.

permalink
report
parent
reply
5 points

Standard ML the programming language or standard as in conventional and ML as in machine learning?

permalink
report
parent
reply

TechTakes

!techtakes@awful.systems

Create post

Big brain tech dude got yet another clueless take over at HackerNews etc? Here’s the place to vent. Orange site, VC foolishness, all welcome.

This is not debate club. Unless it’s amusing debate.

For actually-good tech, you want our NotAwfulTech community

Community stats

  • 2.1K

    Monthly active users

  • 428

    Posts

  • 9.6K

    Comments

Community moderators