破晓
5.3K posts

破晓
@AHpxEx
Too young, sometimes native. 人文社科/AI Native 探索者,做产品的人,每天都读书,思考并骑摩托车。 英文账号 @ofshawnfan

“前端工程师” 不变成 “AI 软件工程师”已经找不到工作了。 22年的时候,团队需要两个前端,需求发出去当天收了100个外包简历 + 外包公司人力小姐姐每天穿着清凉轮流往我这里跑。 那时候我就知道前端凉了。

工业革命之前,全世界人口还不到十亿,实际上直到 1800 年,人口才突破十亿。但工业革命以后,卢德主义者们要砸烂纺织机,反对纺织工业化,担心工业纺织机会让他们失业。那时候如果有人说地球总人口会突破 80 亿,而且生活质量更高,并且创造了更多的就业,是没有人会相信的。 在今天这个 AI 时代,依然能看到很多卢德主义者,担心 AI 会让人失业,会让人饿死,说明卢德主义基因是能遗传的。😂

卧槽了,Hexo 误将项目私有,现在变成了128 🌟的小项目了🤣

有一AI创业项目,没有论证过 国内的小伙伴有没有想试的? THE IDEA: 给老人写书 THE PATH: 提供上门服务,将老人们的口述语音记下来,整理成书,直到小批量印刷 高客单价

❗️🚨 Microsoft Edge keeps every saved password in process memory as cleartext from the moment it launches. Microsoft's responsed when reported: "by design." All of them. Including credentials for sites you won't open this session. Researcher @L1v1ng0ffTh3L4N tested every major Chromium browser. Edge is the only one that behaves this way. Chrome decrypts credentials on demand, and App-Bound Encryption locks the keys to an authenticated Chrome process so other processes can't reuse them. In Chrome, plaintext surfaces only during autofill or when a password is viewed, making memory scraping far less useful. What makes this extra weird is that Edge still demands re-authentication before revealing those passwords in its Password Manager UI, while the same browser process already holds every one of them in plaintext. In shared environments, this turns into a credential harvest. On a terminal server, an attacker with admin rights can read the memory of every logged-on user process. In the published PoC video, a compromised admin account lifts stored credentials from two other logged-on (and even disconnected) users with Edge running. Microsoft's official response when notified: "by design." The finding was disclosed April 29 at BigBiteOfTech by PaloAltoNtwks Norway, alongside a small educational tool that lets anyone verify the cleartext storage for themselves.











