shrugal

joined 2 years ago
[–] [email protected] 4 points 8 months ago

Hier geht es aber in aggregierte Geschäftsdaten.

Gilt für beides. Es gibt ja schon Integrationen, bei denen man einfach GB von Daten jeglicher Art hochlädt, damit die KI darauf Zugriff hat und maßgeschneiderte Antworten geben kann. Und je mehr die KI versteht, desto mehr ist man gewillt hochzuladen, weil es ja nützlich sein könnte.

[–] [email protected] 4 points 8 months ago (2 children)

Ja so verstehe ich das auch, es ist nur etwas ungünstig formuliert. Es geht darum aus den Daten alle nützlichen Informationen zu extrahieren, nicht "alle Daten" zu sammeln. Wobei sie mit den sehr persönlichen KI Assistenten natürlich trotzdem auf dem Weg dahin sind.

[–] [email protected] 42 points 8 months ago (11 children)

I'd say nobody. Not putting innocent people in jail is more important than punishing criminals imo. But idk what to do with the guilty half instead.

[–] [email protected] 2 points 8 months ago

Maybe take a look at Appflowy. It's another Notion clone like Anytype, but it's much easier to selfhost.

[–] [email protected] 2 points 8 months ago

No, it really doesn't. That's like creating a bot that buys and sells company shares automatically, and saying the stock exchange has a vulnerability because your bot makes bad decisions.

[–] [email protected] 1 points 8 months ago* (last edited 8 months ago)

I just set up a Vouch-Proxy for this yesterday. It uses the nginx auth_request directive to authenticate users with an SSO server, and then stores the token in a domain-wide cookie, so you're logged in across all subdomains. Works pretty well so far, you don't even notice it when you're logged in to your SSO provider.

But you do have to tell the proxy where you want to redirect a request somehow, either by subdomain (illegal.yourdomain.com) or port (yourdomain.com:8787) or path (yourdomain.com/illegal). I'm not sure if it works with raw IPs as hosts, but you can add additional restrictions like only allowing local client IPs.

In my special case I'm using the local Synology SSO server, and I have to spin up an additional nginx server because the built-in one doesn't support auth_request.

[–] [email protected] 1 points 8 months ago

UsenetServer, and I used this discount link.

[–] [email protected] 6 points 8 months ago* (last edited 8 months ago) (2 children)

Can't talk for the free tier, but my Usenet account comes bundled with a paid Privado account, and that's working ok so far. The connections have been reliable, fast, and low latency.

My main issue has been that it doesn't support port forwarding. Also, some GeoIP services locate many of their servers in the Netherlands, instead of where Privado says they are. Idk who's right, but it's definitely a problem if you want to pick a specific location.

[–] [email protected] 9 points 8 months ago (1 children)

What's absurd is this crypto maximalist take.

You can't just make up your own permission and punishment system, and then expect the legal system to just step aside and let it handle all disputes, especially when it comes to fraud. That's like founding your own city in an existing country, and declaring all existing law obsolete. I know some people think this is a real possibility, but the real world doesn't work like that.

[–] [email protected] 39 points 8 months ago* (last edited 8 months ago) (3 children)

IANAL and all, but bad/unfavorable contracts and literal deception/fraud are two different things, at least in the legal system. Not everything that's technically possible is also allowed, obviously.

Compare it to using a security flaw to hack into a system. Technically you're only using the official API, maybe in unusual ways, but still. But you're doing it in bad faith and causing harm, maybe pretending to be someone you're not or injecting fake data into the system, and that can make a difference.

[–] [email protected] 43 points 8 months ago* (last edited 8 months ago) (2 children)

It's not. They tricked some MEV-Boost bots into doing bad trades.

[–] [email protected] 115 points 8 months ago (27 children)

Here is a more detailed explanation of the exploit.

The Pepaire-Bueno brothers exploited a bug in MEV-boost's code that allowed them to preview the content of blocks before they were officially delivered to validators, according to the indictment.

The brothers created 16 Ethereum validators and targeted three specific traders who operated MEV bots, the indictment said. They used bait transactions to figure out how those bots traded, lured the bots to one of their validators which was validating a new block and basically tricked these bots into proposing certain transactions. [...]

So hardly an attack on any core system of cryptocurrencies.

view more: ‹ prev next ›