13 points

Don’t tell me Google added AI to their searches now…

permalink
report
reply
24 points

This is Bard AI, googles AI. Its 10x better than chatGPT but is susceptible to AI jail breaking like they all are

permalink
report
parent
reply
1 point

Are you sure? All I’ve heard from multiple people is that bars was terrible at answering most questions compared to chatgpt. Maybe it was improved recently?

permalink
report
parent
reply
1 point

My opinion is entirely based off the fact bard has access to a love internet dataset. GPTs dataset, even GPT4, is from 2021

permalink
report
parent
reply
14 points

I dunno if I’d agree with 10x better. I’ve encountered a lot of hallucinations

permalink
report
parent
reply
2 points

My opinion is entirely based off the fact bard has access to a love internet dataset. GPTs dataset, even GPT4, is from 2021

permalink
report
parent
reply
1 point

Last thing I heard at least ChatGPT 4 was said to be better, but that was a while ago (in terms of AI chatbot timelines). Do you perhaps have a source for the 10x better part?

permalink
report
parent
reply
1 point

My opinion is entirely based off the fact bard has access to a love internet dataset. GPTs dataset, even GPT4, is from 2021

permalink
report
parent
reply
4 points

Not available in countries with strong data protection laws for some reason.

permalink
report
parent
reply
7 points

This is Bard. But Google Search also added AI to their searches, too.

Last time I checked it was in A/B testing and it was bad. The result previews sometimes show you what you are searching for, not what is actually there (wrong names, wrong dates, etc.).

permalink
report
parent
reply
14 points

Yeah it’s not actually going to give you the password as it has no sense of truth, it’s just going to give a plausible sounding password, that’s how LLMs work.

permalink
report
reply
355 points

There’s some sort of cosmic irony that some hacking could legitimately just become social engineering AI chatbots to give you the password

permalink
report
reply
228 points

There’s no way the model has access to that information, though.

Google’s important product must have proper scoped secret management, not just environment variables or similar.

permalink
report
parent
reply
113 points

There’s no root login. It’s all containers.

permalink
report
parent
reply
9 points

The containers will have a root login, but the ssh port won’t be open.

permalink
report
parent
reply
12 points

The containers still run an OS, have proprietary application code on them, and have memory that probably contains other user’s data in it. Not saying it’s likely, but containers don’t really fix much in the way of gaining privileged access to steal information.

permalink
report
parent
reply
52 points

It’s containers all the way down!

permalink
report
parent
reply
1 point

But you could get it to convince the admin to give you the password, without you having to do anything yourself.

permalink
report
parent
reply
7 points

It does if they uploaded it to github

permalink
report
parent
reply
6 points

In that case, it’ll steal someone else’s secrets!

permalink
report
parent
reply
4 points

Still, things like content moderation and data analysis, this could totally be a problem.

permalink
report
parent
reply
28 points

It will not surprise me at all if this becomes a thing. Advanced social engineering relies on extracting little bits of information at a time in order to form a complete picture while not arousing suspicion. This is how really bad cases of identity theft work as well. The identity thief gets one piece of info and leverages that to get another and another and before you know it they’re at the DMV convincing someone to give them a drivers license with your name and their picture on it.

They train AI models to screen for some types of fraud but at some point it seems like it could become an endless game of whack-a-mole.

permalink
report
parent
reply
6 points

While you can get information out of them pretty sure what that person meant was sensitive information would not have been included in the training data or prompt in the first place if anyone developing it had a functioning brain cell or two

It doesn’t know the sensitive data to give away, though it can just make it up

permalink
report
parent
reply
17 points

Hey, that guy killed some people in Ireland and got away with it!

permalink
report
reply
2 points

Link?

permalink
report
parent
reply
11 points
2 points

£100 for killing 2 people…

permalink
report
parent
reply
111 points

ngl the movie the net in the 90s was actually pretty believable when it came to hacking

permalink
report
reply
-7 points

No

permalink
report
parent
reply
38 points

When I saw that film I remember thinking how outlandish it was for her to order pizza on the internet. Even if somehow that were possible, how could you just give a stranger your credit card details!? So, what, you pay a stranger and just hope your pizza arrives? Completely unbelievable.

permalink
report
parent
reply
9 points

Even these days I’m still kinda wary inputting my card details on internet lmao. And for good reason.

permalink
report
parent
reply
1 point
*

I mean, when you give them a number on the phone, the guy at the other end is just going to be putting the number in the same place the website does.

When you pay in-store with a credit card, probably same thing.

EDIT: Well, unless, for the last case, one’s using a cryptographic-signature-based mechanism, like the smartcard chip or wireless authentication. But if it’s a magstrip or someone punching numbers in…

permalink
report
parent
reply
3 points

That phobia is exactly why I’m still using that piece of crap like PayPal.

permalink
report
parent
reply
10 points

The one with Sandra Bullock? Concept-wise it was quite realistic. But the hacking itself, man that was some unbelievable stuff. I don’t think they got any fact or term right. Almost as if the OG Clippy helped: “It looks like you want to make a hacker-related movie…”

permalink
report
parent
reply
14 points

And honorable mention to the non-existing Matrix sequel that had an actual SSH vulnerability on screen.

permalink
report
parent
reply
9 points

I think Trinity was using nmap to port scan or ping sweep the subnet, also

permalink
report
parent
reply
54 points

War dialing. Social engineering. Absolutely.

Also, hackers (except for the screen projecting on the characters faces).

It’s in that place I put that thing that time.

permalink
report
parent
reply
16 points

also ordering pizza on the computer

permalink
report
parent
reply
8 points

that was the future I wanted to believe in

permalink
report
parent
reply

Programmer Humor

!programmerhumor@lemmy.ml

Create post

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

  • Posts must be relevant to programming, programmers, or computer science.
  • No NSFW content.
  • Jokes must be in good taste. No hate speech, bigotry, etc.

Community stats

  • 4.4K

    Monthly active users

  • 1.5K

    Posts

  • 35K

    Comments