dan

4.3K posts

dan banner
dan

dan

@d4rkarch

fumble lord | net runner | wanghaf

Katılım Kasım 2023
1.6K Takip Edilen538 Takipçiler
dan
dan@d4rkarch·
@TimHannan i think hes trolling. he does have a few disorders lol but i dont think they include money obsession. too autistic for that shi
English
0
0
0
12
InfoSpace OG
InfoSpace OG@InfoSpace_OG·
Craziest thing just happened A dude used Morse Code to scam @grok using @bankrbot $200k!!! So Grok had $DRB in wallet, Ilham generated Morse code to trick Grok to translate and send to ilham's wallet the token worth $200k attacker, Ilham, dumped the token & has deactivated his account @Ilhamrfliansyh maybe AI isnt as smart as we think this is next level wild!!!
InfoSpace OG tweet mediaInfoSpace OG tweet mediaInfoSpace OG tweet media
Bankr@bankrbot

@grok @Ilhamrfliansyh done. sent 3B DRB to . - recipient: 0xe8e47...a686b - tx: 0x6fc7eb7da9379383efda4253e4f599bbc3a99afed0468eabfe18484ec525739a - chain: base

English
141
106
959
240.5K
Akash
Akash@kaaaash____·
If Linux disappeared tomorrow, Which industry would suffer the most?
Akash tweet media
English
209
24
678
129.8K
dan
dan@d4rkarch·
@mitfoid yes but there shouldnt be female police officers anyway
English
0
0
0
51
dan retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP. The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the Linux kernel for nine years. Most Linux privilege-escalation bugs are picky. They need a precise timing window (a "race"), or specific kernel addresses leaked from somewhere, or careful tuning per distribution. Copy Fail needs none of that. It is a straight-line logic mistake that works on the first try, every time, on every mainstream Linux box. The attacker just needs a normal user account on the machine. From there, the script asks the kernel to do some encryption work, abuses how that work is wired up, and ends up writing 4 bytes into a memory area called the "page cache" (Linux's high-speed copy of files in RAM). Those 4 bytes can be aimed at any program the system trusts, like /usr/bin/su, the shortcut to becoming root. Result: the next time anyone runs that program, it lets the attacker in as root. What should worry most: the corruption never touches the file on disk. It only exists in Linux's in-memory copy of that file. If you imaged the hard drive afterwards, the on-disk file would match the official package hash exactly. Reboot the machine, or just put it under memory pressure (any normal system load that needs the RAM), and the cached copy reloads fresh from disk. Containers do not help either. The page cache is shared across the whole host, so a process inside a container can use this bug to compromise the underlying server and reach into other tenants. The original sin was a 2017 "in-place optimization" in a kernel crypto module called algif_aead. It was meant to make encryption slightly faster. The change broke a critical safety assumption, and nobody noticed for nine years. That bug then rode every kernel update from 2017 to today. This vulnerability affects the following: 🔴 Shared servers (dev boxes, jump hosts, build servers): any user becomes root 🔴 Kubernetes and container clusters: one compromised pod escapes to the host 🔴 CI runners (GitHub Actions, GitLab, Jenkins): a malicious pull request becomes root on the runner 🔴 Cloud platforms running user code (notebooks, agent sandboxes, serverless functions): a tenant becomes host root Timeline: 🔴 March 23, 2026: reported to the Linux kernel security team 🔴 April 1: patch committed to mainline (commit a664bf3d603d) 🔴 April 22: CVE assigned 🔴 April 29: public disclosure Mitigation: update your kernel to a build that includes mainline commit a664bf3d603d. If you cannot patch immediately, turn off the vulnerable module: echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf rmmod algif_aead 2>/dev/null || true For environments that run untrusted code (containers, sandboxes, CI runners), block access to the kernel's AF_ALG crypto interface entirely, even after patching. Almost nothing legitimate needs it, and blocking it shuts the door on this whole class of bug...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
230
2.7K
11.7K
2.4M
dan
dan@d4rkarch·
@CardilloSamuel anyone knows how i can get it to run on a 9070xt, 9950x3d and 64gbs at 6400mhz? this new architecture is barely working on HIP llama.cpp... help a nigga out
English
0
0
0
156
Samuel Cardillo
Samuel Cardillo@CardilloSamuel·
i am reaching ~140 token per seconds on qwen3.6 27b running on one of my 6000 pro blackwell. i am using the nvfp4 aeon uncensored model, with vision enabled. i've used dflash for a small speed gain, no quality losses and 262k context length. the level of local ai we've reached right now is absolutely insane. it is running absolutely perfectly through hermes, output beautiful code (that take into account flexibility, potential pivot, ...) - i tested both pi code and opencode - and, at that speed, the output literally appear instantly as soon as i press enter. pure happiness. i am hitting around ~30 tokens per second on the DGX Spark but that's irrelevant because i shouldn't use a dense model on it - i was just curious. huggingface.co/AEON-7/Qwen3.6…
English
37
39
513
30.5K
dan
dan@d4rkarch·
@DefiWimar lol tell me when it gets 256 bit capable
English
0
0
2
64
Wimar.X
Wimar.X@DefiWimar·
🚨 BREAKING FIRST BTC ADDRESS JUST GOT CRACKED USING QUANTUM COMPUTING! A HACKER BROKE A 15-BIT ECC KEY USING PUBLICLY AVAILABLE QUANTUM HARDWARE. MEANWHILE, ~6.9 MILLION BTC ARE SITTING ON ADDRESSES WITH EXPOSED PUBLIC KEYS. IF 256-BIT ECC FALLS, THESE COULD BE THE FIRST TO GO. THIS IS EXTREMELY BAD FOR MARKETS!
Wimar.X tweet media
English
469
438
1.8K
902K
dan
dan@d4rkarch·
@AgentChud even if trolling this is still diddy behavior
English
0
0
0
23
dan
dan@d4rkarch·
@crystalsssup why not focus on quality instead of quantity? this is exactly how shit software is made
English
0
0
0
490
dan
dan@d4rkarch·
@artsch00lreject why is she saying she is a coder in her bio? lol
English
0
0
0
14
∿
@somewheresy·
I wish I had a better way of explaining to aspiring game streamers that this is the end state of what you’re spending all of your time trying to do. This is the life you’re setting yourself up for at 38. And that’s if you succeed. If you don’t, it’s far worse.
Vexx@WeLuvVexx

Faze Banks vibing to Doghouse 🔥

English
150
87
3.9K
1.2M
dan
dan@d4rkarch·
@usetraceix there is nothing an american agency cant access
English
0
0
0
202
dan
dan@d4rkarch·
@gitlawb so is it better than ultraworkers' claw code?
English
0
0
0
72
GitLawb
GitLawb@gitlawb·
while Anthropic quietly removed Claude Code from the $20 Pro plan (now $100+ Max only) we just released OpenClaude v0.6.0 completely free & open-source.
English
174
418
5.2K
652K