Origo Toro

5K posts

Origo Toro banner
Origo Toro

Origo Toro

@cimdish

Ventu treideris

Katılım Aralık 2010
323 Takip Edilen147 Takipçiler
Origo Toro retweetledi
RAZOR BLADE
RAZOR BLADE@razorblade300·
Full video of pirates narrating how they operate.
English
725
3.8K
85.2K
2M
Origo Toro retweetledi
Knock Knock 🔮 ♞
Knock Knock 🔮 ♞@SuddenlyJon·
Unedited Artemis II reentry just dropped.
Feast your eyes. This shit is insane.
English
100
528
13.3K
281.9K
Kaspars Foigts 🐻
Kaspars Foigts 🐻@laacz·
"Hail Mary". Neesmu stāsta lielākais fans, līdz ar to vērtēju pašu filmu. Un ja stāstu nevērtē, tad pilnīgs un absolūts amaze, amaze, amaze.
Latviešu
1
1
13
2.9K
Origo Toro retweetledi
Ronan Farrow
Ronan Farrow@RonanFarrow·
This announcement arrives hours after our investigation (newyorker.com/magazine/2026/…) described how OpenAI dissolved its superalignment and AGI-readiness teams and dropped safety from the list of its most significant activities on its IRS filings—and how, when we asked to speak with researchers, working on existential safety, a representative replied "What do you mean by 'existential safety'? That's not, like, a thing."
OpenAI@OpenAI

Introducing the OpenAI Safety Fellowship, a new program supporting independent research on AI safety and alignment—and the next generation of talent. openai.com/index/introduc…

English
50
1.4K
7K
550.3K
Origo Toro retweetledi
Ronan Farrow
Ronan Farrow@RonanFarrow·
(🧵1/11) For the past year and a half, I've been investigating OpenAI and Sam Altman for @NewYorker. With my coauthor @andrewmarantz, I reviewed never-before-disclosed internal memos, obtained 200+ pages of documents related to a close colleague, including extensive private notes, and interviewed more than 100 people. OpenAI was founded on the premise that A.I. could be the most dangerous invention in human history—and that its C.E.O. would need to be a person of uncommon integrity. We lay out the most detailed account yet of why Altman was ousted out by board members and executives who came to believe he lacked that integrity, and ask: were they right to allege that he couldn't be trusted? A thread on some of of our findings:
Ronan Farrow tweet media
English
583
8.2K
37K
8.5M
Origo Toro retweetledi
Andrej Karpathy
Andrej Karpathy@karpathy·
Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.
Daniel Hnyk@hnykda

LiteLLM HAS BEEN COMPROMISED, DO NOT UPDATE. We just discovered that LiteLLM pypi release 1.82.8. It has been compromised, it contains litellm_init.pth with base64 encoded instructions to send all the credentials it can find to remote server + self-replicate. link below

English
1.4K
5.3K
27.9K
66.6M
Origo Toro retweetledi
Hedgie
Hedgie@HedgieMarkets·
🦔 Researchers at Aikido Security found 151 malicious packages uploaded to GitHub between March 3 and March 9. The packages use Unicode characters that are invisible to humans but execute as code when run. Manual code reviews and static analysis tools see only whitespace or blank lines. The surrounding code looks legitimate, with realistic documentation tweaks, version bumps, and bug fixes. Researchers suspect the attackers are using LLMs to generate convincing packages at scale. Similar packages have been found on NPM and the VS Code marketplace. My Take Supply chain attacks on code repositories aren't new, but this technique is nasty. The malicious payload is encoded in Unicode characters that don't render in any editor, terminal, or review interface. You can stare at the code all day and see nothing. A small decoder extracts the hidden bytes at runtime and passes them to eval(). Unless you're specifically looking for invisible Unicode ranges, you won't catch it. The researchers think AI is writing these packages because 151 bespoke code changes across different projects in a week isn't something a human team could do manually. If that's right, we're watching AI-generated attacks hit AI-assisted development workflows. The vibe coders pulling packages without reading them are the target, and there are a lot of them. The best defense is still carefully inspecting dependencies before adding them, but that's exactly the step people skip when they're moving fast. I don't really know how any of this gets better. The attackers are scaling faster than the defenses. Hedgie🤗 arstechnica.com/security/2026/…
English
123
808
3K
718.6K
Origo Toro retweetledi
Propastop
Propastop@propastop·
🚨 “Narva People’s Republic” memes are spreading: flags, maps, and “autonomy” jokes framing Narva as separate from Estonia. Edgy humor? No—the messaging echoes the 2014 Donbas propaganda playbook: stoking ethnic tension to normalize separatism. Analysis ⬇️
Propastop tweet media
English
35
141
882
146.4K
Origo Toro retweetledi
Aakash Gupta
Aakash Gupta@aakashgupta·
Everyone’s missing the real story here. Meta’s Ray-Ban glasses need human data annotators to train the AI. When you say “Hey Meta” and ask the glasses to analyze something, that video gets sent to Meta’s servers, then routed to Sama, a subcontractor in Nairobi, Kenya. Workers there manually label objects in your footage. They see everything you recorded, intentionally or not. 7 million pairs sold in 2025 alone. Every single pair generates training data that flows through human eyes in Kenya. Workers told Swedish journalists they see people undressing, using bathrooms, having sex, and accidentally filming bank card details. One worker said “we see everything, from living rooms to naked bodies.” Meta’s automatic face anonymization is supposed to protect people in the footage. Workers say it fails in certain lighting. Faces that should be blurred are sometimes fully visible. The person you recorded without knowing? A stranger in Nairobi can identify them. Buried in Meta’s terms of service is one sentence doing enormous legal work: the company reserves the right to conduct “manual (human) review” of your AI interactions. That’s the legal cover for routing intimate footage from Western homes to a $2/hour labor force operating under NDAs, office surveillance cameras, and a strict no-questions policy. Workers say if you raise concerns about what you’re seeing, you’re fired. This is the same company, Sama, that TIME exposed in 2023 for paying Kenyan workers $2/hour to label graphic content for OpenAI while being billed at $12.50/hour per worker. Workers described the experience as torture. Sama ended that contract, then pivoted to labeling Meta’s glasses footage. Same workforce. Same rates. Meta markets these glasses as “designed with your privacy in mind.” The privacy design is a tiny LED light on the frame that most people don’t notice. The data pipeline behind it routes your bedroom footage to a contractor with a documented history of worker exploitation, failed anonymization, and union-busting lawsuits. And the next generation of these glasses? Meta is planning to add facial recognition. The same system that can’t reliably blur faces in training data wants to start identifying them on purpose. The LED light on the frame is doing about as much for your privacy as the terms of service nobody reads.
Shibetoshi Nakamoto@BillyM2k

why the fuck meta employees watching videos their users are taking

English
438
14.9K
47.8K
4.9M
Origo Toro
Origo Toro@cimdish·
@gljuksx Likās pat ka scam, tikai dēļ šī teksta “Ja esat pieslēdzies savam kontam, vispirms jāatslēdzas no tā (sadaļa “Mans konts” / Citi / Atslēgties).”
Latviešu
2
0
1
250
Origo Toro retweetledi
Open Source Intel
Open Source Intel@Osint613·
BREAKING: 🔴 Soldiers in Benin say they have carried out a coup, claiming to have removed President Patrice Talon from power, and announce the suspension of the Constitution. This is a developing situation.
English
170
556
2.6K
554.3K
Origo Toro retweetledi
Computer
Computer@AskPerplexity·
🚨The White House just launched the Genesis Mission — a Manhattan Project for AI The Department of Energy will build a national AI platform on top of U.S. supercomputers and federal science data, train scientific foundation models, and run AI agents + robotic labs to automate experiments in biotech, critical materials, nuclear fission/fusion, space, quantum, and semiconductors. Let’s unpack what this order actually builds, and how it could rewire the AI, energy, and science landscape over the next decade:
Computer tweet media
English
825
1.6K
9.6K
9.2M