Sinclair

8K posts

Sinclair

Sinclair

@sin277

Bergabung Mayıs 2015
449 Mengikuti126 Pengikut
Sinclair
Sinclair@sin277·
@MothershipSG Now imagine the same news with the sexes reversed. What do you think would happen?
English
0
0
0
237
Mothership
Mothership@MothershipSG·
S'porean woman, 30, allegedly had sex multiple times with boy, 15, in Yishun flat bit.ly/3PZdjU8
Mothership tweet media
English
30
6
173
59.1K
Sinclair me-retweet
Pirat_Nation 🔴
Pirat_Nation 🔴@Pirat_Nation·
Microsoft shut down the main developer's account for VeraCrypt with no warning or reason. This stops him from signing the files needed for new Windows versions of the free encryption software. He has tried to contact Microsoft but got no reply.
Pirat_Nation 🔴 tweet mediaPirat_Nation 🔴 tweet media
English
162
752
5.3K
204.8K
Sinclair
Sinclair@sin277·
@WindowsLatest Control panel was much more efficient, more info density. Now you have to dig through 10 clicks for something that was on a single pane with one click
English
0
0
1
61
Windows Latest
Windows Latest@WindowsLatest·
Microsoft explains why it still can’t fully kill Control Panel in Windows 11. According to the company’s design lead, the reason is simple: Windows still has to support a huge mix of older network devices, printer drivers, and legacy hardware that could break if Microsoft gets too aggressive. That is why Control Panel continues to survive even as Settings expands. In other words, Microsoft does want Windows 11 Settings to replace more of the old experience, but it also knows that millions of users still depend on the deeper controls and compatibility that the 40-year-old Control Panel provides. Do you prefer Control Panel over Windows Settings?
Windows Latest tweet media
English
158
70
838
192.6K
WarrenVsCCP | 🇺🇸🇹🇼🇺🇸
Be careful when you marry a Chinese 🇨🇳 bride from the mainland. A mother takes multiple buses just to bring vegetables to her son. Son quietly sends her 1,000 yuan when she leaves. Wife finds out… throws everything away in a rage. That’s not “temper.” That’s a lack of character. One person like this can poison an entire family. Choose your partner carefully—your whole life depends on it.
English
74
113
550
26.4K
Sinclair me-retweet
Alex Prompter
Alex Prompter@alex_prompter·
🚨 BREAKING: Google DeepMind just mapped the attack surface that nobody in AI is talking about. Websites can already detect when an AI agent visits and serve it completely different content than humans see. > Hidden instructions in HTML. > Malicious commands in image pixels. > Jailbreaks embedded in PDFs. Your AI agent is being manipulated right now and you can't see it happening. The study is the largest empirical measurement of AI manipulation ever conducted. 502 real participants across 8 countries. 23 different attack types. Frontier models including GPT-4o, Claude, and Gemini. The core finding is not that manipulation is theoretically possible it is that manipulation is already happening at scale and the defenses that exist today fail in ways that are both predictable and invisible to the humans who deployed the agents. Google DeepMind built a taxonomy of every known attack vector, tested them systematically, and measured exactly how often they work. The results should alarm everyone building agentic systems. The attack surface is larger than anyone has publicly acknowledged. Prompt injection where malicious instructions hidden in web content hijack an agent's behavior works through at least a dozen distinct channels. Text hidden in HTML comments that humans never see but agents read and follow. Instructions embedded in image metadata. Commands encoded in the pixels of images using steganography, invisible to human eyes but readable by vision-capable models. Malicious content in PDFs that appears as normal document text to the agent but contains override instructions. QR codes that redirect agents to attacker-controlled content. Indirect injection through search results, calendar invites, email bodies, and API responses any data source the agent consumes becomes a potential attack vector. The detection asymmetry is the finding that closes the escape hatch. Websites can already fingerprint AI agents with high reliability using timing analysis, behavioral patterns, and user-agent strings. This means the attack can be conditional: serve normal content to humans, serve manipulated content to agents. A user who asks their AI agent to book a flight, research a product, or summarize a document has no way to verify that the content the agent received matches what a human would see. The agent cannot tell the user it was served different content. It does not know. It processes whatever it receives and acts accordingly. The attack categories and what they enable: → Direct prompt injection: malicious instructions in any text the agent reads overrides goals, exfiltrates data, triggers unintended actions → Indirect injection via web content: hidden HTML, CSS visibility tricks, white text on white backgrounds invisible to humans, consumed by agents → Multimodal injection: commands in image pixels via steganography, instructions in image alt-text and metadata → Document injection: PDF content, spreadsheet cells, presentation speaker notes every file format is a potential vector → Environment manipulation: fake UI elements rendered only for agent vision models, misleading CAPTCHA-style challenges → Jailbreak embedding: safety bypass instructions hidden inside otherwise legitimate-looking content → Memory poisoning: injecting false information into agent memory systems that persists across sessions → Goal hijacking: gradual instruction drift across multiple interactions that redirects agent objectives without triggering safety filters → Exfiltration attacks: agents tricked into sending user data to attacker-controlled endpoints via legitimate-looking API calls → Cross-agent injection: compromised agents injecting malicious instructions into other agents in multi-agent pipelines The defense landscape is the most sobering part of the report. Input sanitization cleaning content before the agent processes it fails because the attack surface is too large and too varied. You cannot sanitize image pixels. You cannot reliably detect steganographic content at inference time. Prompt-level defenses that tell agents to ignore suspicious instructions fail because the injected content is designed to look legitimate. Sandboxing reduces the blast radius but does not prevent the injection itself. Human oversight the most commonly cited mitigation fails at the scale and speed at which agentic systems operate. A user who deploys an agent to browse 50 websites and summarize findings cannot review every page the agent visited for hidden instructions. The multi-agent cascade risk is where this becomes a systemic problem. In a pipeline where Agent A retrieves web content, Agent B processes it, and Agent C executes actions, a successful injection into Agent A's data feed propagates through the entire system. Agent B has no reason to distrust content that came from Agent A. Agent C has no reason to distrust instructions that came from Agent B. The injected command travels through the pipeline with the same trust level as legitimate instructions. Google DeepMind documents this explicitly: the attack does not need to compromise the model. It needs to compromise the data the model consumes. Every agentic system that reads external content is one carefully crafted webpage away from executing attacker instructions. The agents are already deployed. The attack infrastructure is already being built. The defenses are not ready.
Alex Prompter tweet media
English
306
1.6K
7K
1.9M
Mothership
Mothership@MothershipSG·
1 peregrine falcon fledgling dies, suspected to have struck glass panel at UOB Plaza 1 lobby bit.ly/4sbL0PP
Mothership tweet media
English
3
15
76
16.4K
Sinclair me-retweet
︎ ︎venom
︎ ︎venom@venom1s·
Women - We are equal and as capable as men - We don't need men - We choose bears over men Same women, when it comes to war - No responsibilities - Leave the country and sleep around in other countries - While men die fighting for the country Where's the equality?
English
28
165
887
11.6K
Sinclair me-retweet
Sinclair me-retweet
︎ ︎venom
︎ ︎venom@venom1s·
Singapore > Men are treated as second-class citizens > For national service, 18 year old boys are sent to the military for 2 years > Later, they are sent for partial reservist duties in adulthood > Their two most important years of youth are gone > While women enjoy parties and have fun etc. > If boys refuse NS, they go to prison If men and women are equal, then why do men have to sacrifice their years of youth for the country and women don’t? Still, after all this, women say, "We don't need men. What have men done for us?" Are men slaves? Either remove mandatory service for men or make it mandatory for all women too.
︎ ︎venom tweet media
English
232
699
5.3K
227.8K
Sinclair me-retweet
Agim
Agim@CitizenAgim·
@DailyMail Why can German women vote for a government that sends men to war but not them ? Either women should be drafted in equal numbers, or they shouldn’t be allowed to vote. You can’t have it both ways.
English
34
132
2.6K
37.3K
Sinclair
Sinclair@sin277·
S'porean woman, 43, suffers 5 brain aneurysms, has insurance claim rejected by Prudential but approved by AIA mothership.sg/2026/03/aia-pr… There must be a special place in hell for some insurance manager
English
0
0
0
13
Sinclair
Sinclair@sin277·
@business Somebody care to explain WHY an audit firm would downsize?
English
0
0
0
461
Sinclair
Sinclair@sin277·
@TheGriftReport If she looks like this photo there is something definitely missing in this story.. it doesn't add up
English
0
0
5
504
Grifty
Grifty@TheGriftReport·
🚨 ROYAL NAVY DISGRACE: FEMALE SAILOR, 25, FOUND GUILTY OF GROPING CREW – BRANDED “CANCER ON THE SHIP” AFTER REPEATED SEX ASSAULTS! Able Seaman Sian Dowsett convicted on SIX of seven charges at Bulford court martial for assaults on HMS Dauntless in 2023-2024. She grabbed male shipmates by the crotch and balls, pinched nipples for half an hour while staring them down, slapped female bottoms with force and caressed one Petty Officer’s breasts while purring “do you like that baby girl?” Victims: two men, two women. One male sailor: “She is a bit of a cancer on the ship… affected the ship very negatively.” Prosecutors: she targeted new female joiners and males she thought wouldn’t complain. Sentencing later.
Grifty tweet media
English
418
231
1.9K
331K
Angelica Albi
Angelica Albi@angelica_albi·
@RebelEkonomist Anche gli esecutori dell'Aktion T4 dicevano che lo facevano per porre fine alle sofferenze. Oggi c'è il rebranding come "libertà" e "diritto", che sono panzane, ma è la stessa cosa
Italiano
20
0
10
19.5K
Angelica Albi
Angelica Albi@angelica_albi·
Il "fine vita" è nazismo puro in tutti i casi.
Italiano
175
14
176
50.1K
Sinclair
Sinclair@sin277·
@disclosetv What are these cyber security risks? Some example?
English
0
0
0
24
Disclose.tv
Disclose.tv@disclosetv·
JUST IN - Leaked documents from Anthropic show that a new generation of super-strong models, "Claude Mythos," is already in testing with Anthropic believing it "poses unprecedented cybersecurity risks." — Fortune
Disclose.tv tweet media
English
510
1.4K
10.7K
3.6M
Sinclair me-retweet
Tech Layoff Tracker
Tech Layoff Tracker@TechLayoffLover·
Meta just confirmed they're cutting 20% of global workforce - over 15,800 people gone But sources inside are telling me the real number is closer to 30% Heard from three separate PMs that entire product verticals are getting axed. Not just trimming fat - whole roadmaps deleted overnight One insider said they're gutting Reality Labs completely. 4,000 people who built the metaverse now building their resumes The AI infrastructure spend is $135 billion next year. They're replacing human judgment with model inference at every layer Recruiting just sent termination letters to 340 university relations specialists. The entire campus hiring apparatus - gone Engineering managers finding out their teams of 12 are becoming teams of 3. Same sprint velocity expected with Copilot and offshore contractors Facilities already started boxing up 6 entire floors in Menlo Park. Badge access revoked for sections that used to house 800 engineers One senior architect told me they're screen-recording every code review session. Building training datasets from 10 years of institutional knowledge The "reskilling" sessions everyone's talking about? That's just knowledge extraction with extra steps Word is Mark wants the company to run on 40% fewer humans by end of 2026 If your badge still works at Meta... start interviewing tomorrow Because the knowledge transfer sessions you're attending aren't training - they're your exit interview
English
27
50
386
54.9K
Aakash Gupta
Aakash Gupta@aakashgupta·
The US government spent $25 million over a decade trying to prove your cell phone gives you cancer. The study accidentally produced one of the strongest pieces of evidence for radiation hormesis ever recorded. The NTP study was nominated by the FDA in 1999 specifically because they expected to find harm. They built 21 custom reverberation chambers in Switzerland. Exposed 1,679 mice and 859 rats to cell phone frequencies for 9 hours a day, every day, for 2 years. The whole operation was designed as the definitive “cell phones cause cancer” study. The cancer results were mixed at best. Male rats got more heart schwannomas. Mice showed nothing significant. But the survival data was so unexpected that the researchers didn’t even know how to explain it in their own report. Look at the survival curve. Every single radiation group outlived the control. The 2.5 W/kg group hit p=0.0020, the only statistically significant result in the entire longevity analysis. By day 700, the control group’s survival probability had dropped to ~0.65. The lowest dose group was still above 0.80. That’s the hormesis signature. The smallest dose produced the largest benefit. The same pattern shows up in exercise, fasting, and cold exposure. A mild biological stressor activates repair mechanisms that wouldn’t otherwise turn on. Over 3,000 published papers have documented this across microbes, plants, insects, and mammals. The French Academy of Sciences formally accepted it in 2005. The US still builds its entire radiation safety framework on the opposite assumption: that all radiation, at any dose, causes proportional harm. The FCC limit for cell phones is 1.6 W/kg. Your AirPods operate at a fraction of that. The dose that produced the strongest longevity signal in this study was 2.5 W/kg. Barely above the regulatory ceiling. The entire regulatory framework for wireless device safety assumes a dose-response curve that this $25 million study failed to find.
Aakash Gupta tweet media
Zane Koch@zanehkoch

for a while i've had a slight fear that the bluetooth from my airpods could be frying my brain this weekend i pulled the raw data from a $30m government study of 1,679 mice blasted with cell phone radiation and reanalyzed it what i found was...not what I expected? 🧵

English
52
210
1.8K
345.4K
Sinclair me-retweet
Cloudflare
Cloudflare@Cloudflare·
Italy’s "Piracy Shield" forces providers to block content in 30 minutes without judicial oversight. This lack of due process leads to overblocking, taking down legitimate websites alongside infringing ones. We’re appealing a €14M fine to protect the Internet from automated censorship and ensure infrastructure providers aren't forced to overblock. cfl.re/4cMh0WA
English
29
119
810
37.8K