mangoice
30.1K posts


Elon Musk 中國是次級製造強國。如果你考慮礦石精煉,我會說大約中國的礦石精煉量是世界其他地區加起來的兩倍 就像,我們其實在美國進行稀土礦開採,把岩石……我們裝上火車,然後裝上船運到中國,那裡再換上另一列火車,送到中國的稀土精煉廠,他們再精煉它,製成磁鐵,裝入馬達子組件,然後再運回美國 所以,我們在美國真的缺少很多礦石精煉。我們坦白說需要 Optimus 來建造礦石精煉廠。我們絕對不能只靠人類取勝,因為中國的人口是我們的三倍……中國的平均工作倫理高於美國。 所以我們在人力方面贏不了,但我們在機器人方面可能有機會



Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.



Claude 推出的Dispatch 正式上線 不用安裝複雜的龍蝦 實測用手機遠端控制我的 Mac ✅學習門檻0 ✅Pro 或 Max 訂閱 ✅Mac 電腦 手機是遙控器,Mac 是執行引擎。 🔘從手機發出指令,Claude 在電腦上實際操作 🔘開 App、讀檔案、整理資料,全部在本地執行 🔘檔案不會離開電腦 ⚡️設定只要 5 步驟,2 分鐘完成 1️⃣ 下載 Claude 桌面版 App → claude.com/download 更新至最新版 2️⃣ 打開 Cowork → 點 Dispatch → Get started 3️⃣ 開啟兩個權限開關 → 允許存取檔案 → 保持電腦不睡眠 4️⃣ 手機打開 Claude App → 同帳號登入,Dispatch 自動出現 → 不需要掃 QR Code 5️⃣ 從手機發出第一個任務 🎉 ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ 使用前要注意 ⚠️ ⚠️ Mac 必須保持開機 合上螢幕就停止,這是遠端控制不是雲端 🔒 檔案全程不外傳 所有處理在你的 Mac 上執行 🛡 敏感資料先別用 Research Preview 階段,官方建議迴避 ✅ 每個動作都需要你授權 Claude 會先詢問,你可以隨時叫停










