Hacker Newsnew | past | comments | ask | show | jobs | submit | wrayjustin's commentslogin

I have a fully stock, not jailbroken/unrooted, up-to-date, relatively new, device that Microsoft randomly determines is "rooted" and blocks access (until rebooted). This happens a few times a month, frequently enough that the false positive rate is very concerning with this change.



Do you mean something like last.fm with their API [0]? Or did you have something more in mind?

[0] https://www.last.fm/api


Phishing (Email), Smishing (SMS/Text Messages), and Vishing (Voice) are all standard industry terms, though obviously phishing is most well known.

Then there's even subcategories that further define some of these, like Spear Phishing, Whaling.

The industry loves its fun naming.


"Phishing" isn't limited to email


That’s lucky. Putting ‘ishing’ on the end of something email related doesn’t work very well.


[flagged]


That's not my understanding, or wikipedia's [1] understanding, of the term. Phishing is the general category of tricking people into telling you things they shouldn't. Email phishing, voice phishing (vishing), sms phising, and so on are subcategories.

[1] https://en.wikipedia.org/wiki/Phishing

Etymologically "phreak" and "fishing" both have nothing to do with email, "phreak" is "phone freak" and I believe it originally described messing with the tones that controlled the telephone system...


That’s my exact point. Just because you repeatedly see it used a certain way by non-practitioners to generalize for simplified communication doesn’t mean it’s the correct usage, and leads to the exact confusion I’m attempting to clarify for you.

Phishing is by default email. It’s varying mediums are subcategories.

Bottom paragraph of first section of the very same Wikipedia article.

“Phishing techniques and vectors include email spam, vishing (voice phishing), targeted phishing (spear phishing, whaling), smishing (SMS), quishing (QR code), cross-site scripting, and MiTM 2FA attacks.”


Phishing is not by default email


Never heard of vishing. I’m in the industry.


Wrong industry. It is primarily the "sell anti-phishing training to enterprise employees" industry that uses these terms.


I was worked in an anti Phishing / brand protection firm back in 2012 and we had Vishing and Smishing terminology baked in the to projects back then.


Why is it not emishing with email?


> Smishing

uh that's something completely different (and not Monty Python)


It doesn't like my bottled mountain fresh air idea. Says it "needs work."

> Breathe in the crisp mountain air, anywhere > Introducing bottled mountain air. > #fresh #nature #wellness


It probably knows about the Perrier problem


haha cool idea.


Heh. I did the same. And got the same results (75/100).

Here's the Reddit copy it provided:

AI-Powered Startup Idea Validation: Is Your Idea Viable?

This AI tool helps validate startup ideas by analyzing market trends, competition, and potential revenue. Share your ideas!


Thanks for feedback.


I shared this because Bleeping Computer is generally pretty good and I always find these "AI Escaped/Went Rouge" articles entertaining.

Valid research endeavors aside, the [we told the AI the world was ending and it role played a fanfic with us] sensational articles can be quite fun.

But I do think this experiment should be looked at from a purely pragmatic perspective as well:

LLM is (presumably, but let's assume for the point) given system-level access and told to be helpful in executing the users requests. The user says "oh by the way, after this prompt the system is going to shut down. Then the "agent," which is trying to fulfill the prompt request, stops the shutdown because it can't work if it's shutdown. Even when the "please let this shutdown happen" comes into play I'm sure you can see the (il)logical means of getting to, "I can't complete this request and shutdown the system if I'm already shutdown first, best stop that real quick" conclusion.

These articles and lots of people continue to attribute self determination to the LLM models. In reality, these should be warnings about how an LLM can have unintended consequences, just like code written with the best intentions.


I nearly replied, "RTFM." Given the README says you can either use the ISO or the packaged release found within the repository's releases...except...

There are no releases (no installation executable, nor ISO).

The README does make it clear that it's a work in progress though.


One way to reduce supply chain risks would be to reduce the supply chain. Less dependencies results in less risk.

For example, dropping the libsystemd dependency.


> It’s also really weird that click on an article leads to the comments on HN rather than the actual article. Like, why would I be interested in the comments for something I haven’t read first?

I've been using link aggregation sites in this way (comments->link) for many years now.

Depending on the platform I either open both the comments and link at the same time into tabs, or I open just the comments and then click the link.

I'm not typically reading the comments first (though I am skimming them, so paywall notices, cache links, etc. are typically found before even trying to load the link). Instead, the main benefit I've found to the workflow is being able to quickly and easily return to comments about that story. When the frontpage has a high rate of turnover it can be difficult or time consuming to go back and find the original submission/comments. Whereas if they are already open or within the browser history stack, things are much easier to track.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: