Have a sneer percolating in your system but not enough time/energy to make a whole post about it? Go forth and be mid!
Any awful.systems sub may be subsneered in this subthread, techtakes or no.
If your sneer seems higher quality than you thought, feel free to cutānāpaste it into its own post, thereās no quota for posting and the bar really isnāt that high
The post Xitter web has spawned soo many āesotericā right wing freaks, but thereās no appropriate sneer-space for them. Iām talking redscare-ish, reality challenged āculture criticsā who write about everything but understand nothing. Iām talking about reply-guys who make the same 6 tweets about the same 3 subjects. Theyāre inescapable at this point, yet I donāt see them mocked (as much as they should be)
Like, there was one dude a while back who insisted that women couldnāt be surgeons because they didnāt believe in the moon or in stars? I think each and every one of these guys is uniquely fucked up and if I canāt escape them, I would love to sneer at them.
you canāt just hit me with fucking comedy gold with no warning like that (archive link cause losing this would be a tragedy)
this one just copies a file to another file, with an increasing numerical suffix on the filename. thatās an easily-googled oneliner in bash, but it took the article author multiple tries to fail to get Copilot to do it (they had to modify the best result it gave to make it work)
this is just a script that iterates over all the files it can access, saves a version encrypted against a random (non-persisted, they couldnāt figure out how to save it) key with a
.locked
suffix, deletes the original, changes their screen locker message to a āransomā notice, and presumably locks their screen. thatās 5 whole lines of bash! they wonāt stop talking about how they made this incredibly terrifying thing during lunch, because humblebragging about stupid shit and AI fans go hand in hand.this is where it gets fucking hilarious. they use computer security buzzwords to describe such approaches as:
at one point they describe an error caused by the LLM making shit up as progress. after that, the LLM outputs a script that starts killing random system processes.
so, after 42 tries, did they get something that worked?
of course they fucking didnāt
This is correct, but not for the reasons they think it is terrifying. Imagine one of your coworkers revealing they are this bad at their job.
āguys guys! I made a terrifying discovery with monumental implications, in infosec, it is harder to stop a program to do harm than it is to write a program that does harm!ā (Of course, it is worse, as they donāt seem to come to this basic generalization about infosec, they only apply it to LLMs).
Man Discovers Running Random Sys Commands in Python Can Do Bad Things.
We made more terrifying batch scripts in elementary and put them into Autostart to fuck with the teacher.
When I was a wee younginā, I had an exponential copy one in an org-wide NT autostart (because, yāknow, thatās what kind of stupid shit you do when youāre young and like that)
It took weeeeeks but when it finally accumulated enough it pretty much tanked the entire network. It was kinda hilarious seeing how lost the admins were in trying to figure it out
Probably one of my first lessons in learning some particular things about competencies
Iāve seen better shellcode in wordpress content injection drivebys
āEveryone also agreed with me that this was terrifyingā fuck outta here
And I bet this stupid thing will suddenly be all over infosec sphere within daysā¦
I read a few of the guyās other blog posts and they follow a general theme:
He seems totally hireable as a junior, but he absolutely needs the adult supervision.
The LLM Revolution seems really really bad for this guy specifically ā it promises that he can keep working in this ineffective way without changing anything.
My conspiracy theory is that he isnāt clueless, and that his blogposts are meant to be read by whoever is his boss. In the case of using LLMs for automatic malware and anti-malware.
āOh you want me to use LLMs for our cybersecurity, look how easy it is to write malware (as long as one executes anything they download, and have too many default permissions on a device) using LLMs, and how hard it is to do countermeasures, it took me over 42 (a hint?) tries and I still failed! Maybe itās better to use normal sandboxing, hardening and ACL practices, in the meantime to protect ourselves from this new threat, how convenient itās the same approach weāve always takenā