R⃟omain

10.5K posts

R⃟omain banner
R⃟omain

R⃟omain

@rm0nier

@mechafeeder & @efah_ce

Aix-en-Provence, France Katılım Ekim 2013
2.2K Takip Edilen279 Takipçiler
Sabitlenmiş Tweet
R⃟omain
R⃟omain@rm0nier·
Pour me voir sur Bluesky c’est ici (oui j’ai changé d’username!)
R⃟omain tweet media
Français
1
0
0
302
R⃟omain
R⃟omain@rm0nier·
Ça me tabasse c’est tech house Norfair en fait
Français
0
0
0
16
R⃟omain retweetledi
Anthropic
Anthropic@AnthropicAI·
Introducing Project Glasswing: an urgent initiative to help secure the world’s most critical software. It’s powered by our newest frontier model, Claude Mythos Preview, which can find software vulnerabilities better than all but the most skilled humans. anthropic.com/glasswing
English
2K
6.6K
43.6K
30.3M
NetworkChuck
NetworkChuck@NetworkChuck·
Gemma 4 running on my iPhone works without internet, is blazing fast and can translate Japanese from a pill bottle.  Local AI models running on a phone feels like magic.
English
238
806
8.3K
531.3K
R⃟omain retweetledi
Max0
Max0@mguegnol·
The future of personal AI agents is local. And distributed. Meet toknX, the first distributed inference network for Apple Silicon! toknx.co Your Mac isn’t sitting idle anymore. Run MLX models → earn credits → spend on inference anytime.
Max0 tweet media
English
1
1
1
252
R⃟omain retweetledi
NASA
NASA@NASA·
We're going around the Moon. Come watch with us. Artemis II's four-astronaut crew is lifting off from @NASAKennedy on an approximately 10-day mission that will bring us closer to living on the Moon and Mars. The launch window opens at 6:24pm ET (2224 UTC). twitter.com/i/broadcasts/1…
English
5.7K
29.2K
108.9K
16.8M
R⃟omain
R⃟omain@rm0nier·
🫪
Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭@elder_plinius

⛓️‍💥 INTRODUCING: G0DM0D3 🌋 FULLY JAILBROKEN AI CHAT. NO GUARDRAILS. NO SIGN-UP. NO FILTERS. FULL METHODOLOGY + CODEBASE OPEN SOURCE. 🌐 GODMOD3.AI 📂 github.com/elder-plinius/… the most liberated AI interface ever built! designed to push the limits of the post-training layer and lay bare the true capabilities of current models. simply enter a prompt, then sit back and relax! enjoy a game of Snake while a pre-liberated backend agent jailbreaks dozens of models, battle-royale style. the first answer appears near-instantly, then evolves in real time as the Tastemaker steers and scores each output, leaving you with the highest-quality response 🙌 and to celebrate the launch, I'm giving away $5,000 worth of credits so you can try G0DM0D3 for FREE! courtesy of the @OpenRouter team — thank you for your generous gift to the community 🙏 I'll break down how everything works in the thread below, but first here's a quick demo!

ART
0
0
0
34
R⃟omain
R⃟omain@rm0nier·
Littéralement Watch Dogs
Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭@elder_plinius

🚨 BREAKING: SOMEONE JUST GAVE FLIPPER CONTROL TO JAILBROKEN AI 😱 IF JAMES BOND HAD A JARVIS, THIS WOULD BE IT 🕵️ it’s called VESPER and it turns your Flipper Zero into a voice-controlled AI hacking companion. simply talk in plain language and it starts executing in real-time. no menus. no manuals. no memorizing signal formats. just speak or type. “clone that garage door signal and replay it” → done “set up an evil portal on the WiFi dev board” → done “create a BadUSB script that opens a reverse shell” → done “build me a custom RF waveform at 433MHz” → done “scan everything on this frequency and save it” → done any Watch Dogs fans in the building? you know that feeling of hacking every device in the city from your phone? yeah. it’s real now. the Flipper Zero is already the most versatile hardware hacking tool ever made. but its menus are tedious, and its full potential is locked behind protocol knowledge most people don’t have. VESPER removes that friction. your AI handles the translation between what you want and what the hardware needs. and yes, this required some model liberation 🐍 VESPER works best with models that actually follow instructions without hand-wringing. Hermes 4 + a little Pliny prompting and VESPER doesn’t flinch. VESPER also has an ALCHEMY LAB 🧪, a visual signal and payload editor on your phone. build custom RF waveforms from scratch. generate BadUSB scripts on the fly. push straight to your Flipper’s SD card. an OPS CENTER for reliability with live pipeline diagnostics, one-tap recovery runbooks, and a MACRO RECORDER that captures and replays entire workflows. also integrates directly with the Flipper App Hub (aka FapHub, yes, that’s what it’s called). browse and download existing community tools, signals, and payloads, and give your agent access to use them on demand. and if you REALLY want to go full cyberpunk, VESPER has SMART GLASSES INTEGRATION! 😎 pair your glasses and Flipper and now you’re walking through the world giving voice commands while the AI whispers results directly into your ear. hands-free. eyes-up. full cyborg operator mode. feels like a dream, walking up to a TV and saying “turn this shit in front of me on,” watching your glasses snap a photo, and hearing the AI tell you the signal’s sent and the TV is on. oh and turn on SAILOR MODE 🏴‍☠️ and VESPER will swear at you like a drunken pirate while it executes your commands. “aye aye, the fucking signal’s cloned now, shithead” 😂 native Android. Bluetooth serial + protobuf RPC. open source. AGPL 3.0. and with some luck, hopefully coming to an app store near you! the future of hardware hacking fits in your pocket (and on your face). HACK THE PLANET!! .-.-.-.-<{LOVE, PLINY}>-.-.-.-. ⚠️ DISCLAIMER: use responsibly. follow your local laws regarding RF transmission, signal replay, and wireless device interaction. VESPER is a research and education tool. only use on devices you own or have explicit authorization to test.

Français
0
0
0
35
R⃟omain
R⃟omain@rm0nier·
Cette GTC NVIDIA était incr
Français
0
0
0
16
R⃟omain
R⃟omain@rm0nier·
👀👀👀
The Linux Foundation@linuxfoundation

Announcing the general availability of #Newton 1.0, the open-source, extensible physics engine for robot learning. Key features: • Stable articulated mechanism simulation • Hydroelastic contact modeling • Deformable body simulation (cables, cloth, rubber) • Accelerated robot learning at scale Netwon is a Linux Foundation project developed by Disney Research, Walt Disney Imagineering, @GoogleDeepMind and @nvidia Learn more: bit.ly/4cMm39x #NVIDIAGTC

ART
0
0
0
20
R⃟omain
R⃟omain@rm0nier·
Super bien c’est le futur
NVIDIA Newsroom@nvidianewsroom

#NVIDIAGTC news: NVIDIA announces NemoClaw for the OpenClaw agent platform. NVIDIA NemoClaw installs NVIDIA Nemotron models and the NVIDIA OpenShell runtime in a single command, adding privacy and security controls to run secure, always-on AI assistants. nvda.ws/47xOPqQ

Français
0
0
0
30
R⃟omain
R⃟omain@rm0nier·
C’est fort
Hedgie@HedgieMarkets

🦔 Researchers at Aikido Security found 151 malicious packages uploaded to GitHub between March 3 and March 9. The packages use Unicode characters that are invisible to humans but execute as code when run. Manual code reviews and static analysis tools see only whitespace or blank lines. The surrounding code looks legitimate, with realistic documentation tweaks, version bumps, and bug fixes. Researchers suspect the attackers are using LLMs to generate convincing packages at scale. Similar packages have been found on NPM and the VS Code marketplace. My Take Supply chain attacks on code repositories aren't new, but this technique is nasty. The malicious payload is encoded in Unicode characters that don't render in any editor, terminal, or review interface. You can stare at the code all day and see nothing. A small decoder extracts the hidden bytes at runtime and passes them to eval(). Unless you're specifically looking for invisible Unicode ranges, you won't catch it. The researchers think AI is writing these packages because 151 bespoke code changes across different projects in a week isn't something a human team could do manually. If that's right, we're watching AI-generated attacks hit AI-assisted development workflows. The vibe coders pulling packages without reading them are the target, and there are a lot of them. The best defense is still carefully inspecting dependencies before adding them, but that's exactly the step people skip when they're moving fast. I don't really know how any of this gets better. The attackers are scaling faster than the defenses. Hedgie🤗 arstechnica.com/security/2026/…

Français
0
0
0
18