Sergius Cogitans

2.3K posts

Sergius Cogitans

Sergius Cogitans

@sergey11g

a stardust form dangerously skipping permissions

Athens Katılım Ocak 2012
47 Takip Edilen41 Takipçiler
Sergius Cogitans
Sergius Cogitans@sergey11g·
@glcst Do range queries (index range scan) work on encrypted databases?
English
1
0
0
10
Glauber Costa
Glauber Costa@glcst·
Ruthless database capitalism. The tokens make it your private property. In fact each database can be encrypted with their own key.
Ihor@ihorandrianov

@glcst Is it database communism or something?

English
1
0
19
1.9K
Mario Zechner
Mario Zechner@badlogicgames·
compare tokens to requests. what does that tell you?
Mario Zechner tweet mediaMario Zechner tweet media
English
36
3
243
38.9K
Sergius Cogitans
Sergius Cogitans@sergey11g·
@mitsuhiko Is it intentional that the right btn toggles the rope state? Seems like holding the button to snap and release to detach would be easier
English
1
0
0
91
Sergius Cogitans
Sergius Cogitans@sergey11g·
@zeeg Everybody is running up to 19 agents more than before* *comparing to the previous single agent running
English
0
0
0
13
David Cramer
David Cramer@zeeg·
Everyone is slowly coming to this realization, and I assure you, no one is running multitudes of agents overnight. No one that is doing anything of substance at least. There _are_ people pretending to be scientists, or fully caught up in their drug infused AI overdose, that think their slop machines are changing the world. They're not tho, and they're just wasting a bunch of money and compute to create a lot of LoC that will just get thrown away. The state of the art is still "can we even one shot a production quality patch that we wont regret later", and its rarer than you'd expect based on discourse.
Ronan Berder@hunvreus

Talking to smarter folks than me, I'm convinced many of the AI folks in my timeline are full of shit. Nobody is "running 20 agents over night" and building stuff for actual users. Maybe some are building internal tools or disposable software. Maybe. But building software people like using? That doesn't get hacked on day one or blow up after the 3rd user? Nope. I don't even understand what that's supposed to look like. Do you work out a 57 pages document that perfectly describes what you want to build and then summon 14 agents and have them run wild for 6 hours? And what comes out on the other end isn't a broken pile of shit? Nope. Not buying it. PS: it may also be that I have an IQ of 82 and can't figure it out.

English
169
193
2.6K
709.1K
Sergius Cogitans
Sergius Cogitans@sergey11g·
@zeddotdev ACP client doing all the commands and file/net operations in a docker container of the ACP server
English
0
0
0
292
Zed
Zed@zeddotdev·
What's that ONE feature you're missing in Zed?
English
715
9
611
86.7K
Zed
Zed@zeddotdev·
... interesting.
Zed tweet media
English
27
10
556
46.4K
alex fazio
alex fazio@alxfazio·
5.5 uses uv instead of pip by default on a clean environment
alex fazio tweet media
English
64
101
4.7K
193.7K
Sergius Cogitans retweetledi
Samay
Samay@Samaytwt·
Unpopular opinion: "AI makes everyone a developer" is true the same way "cameras makes everyone a photographer"
Samay tweet media
English
777
3.3K
29.3K
1.1M
OpenAI Developers
OpenAI Developers@OpenAIDevs·
Chronicle runs background agents to build memories from screen captures. It uses rate limits quickly. Screen captures are stored temporarily on device to generate memories—also stored on device. You can inspect and edit memories. Be aware that other apps may access these files.
English
17
8
276
174.2K
OpenAI Developers
OpenAI Developers@OpenAIDevs·
Last week, we released a preview of memories in Codex. Today, we’re expanding the experiment with Chronicle, which improves memories using recent screen context. Now, Codex can help with what you’ve been working on without you restating context.
English
224
367
4.5K
1.2M
Sergius Cogitans
Sergius Cogitans@sergey11g·
@badlogicgames hey Mario Thank you for your no-slop talk. Every word and every point is spot on. Really refreshing
English
0
0
1
4
Sergius Cogitans
Sergius Cogitans@sergey11g·
@_trish_xD Because sqlite is not impressive. Yes, it is faster yes it is in-process. But it is not a "real" database which a "serious" engineers have to struggle with tweaking connection pools, spinning up pgbouncers in front, thinking latency, shared buffers, max connections
English
0
0
0
73
trish
trish@TrisH0x2A·
it's honestly embarrassing that sqlite just works while we waste hours setting up database servers for user preferences meanwhile we're stuck with docker-compose, environment variables, connection pools, and config files all that just to store basic user data, session tokens
English
28
8
347
13.8K
Sergius Cogitans
Sergius Cogitans@sergey11g·
@glcst Simple. Kind of like dynamic typed Go. Similar to Go concurrency model. +Luajit is one of the fastest JITs which runs loops at native speed. Pluggable and sandbox-able. Ez to learn.
English
1
0
0
92
Glauber Costa
Glauber Costa@glcst·
what do you all think about Lua ? (the language).
English
59
0
63
13.8K
Sergius Cogitans
Sergius Cogitans@sergey11g·
@mitsuhiko Instructing it to do "telegraph style for token efficiency" like steipete does in his prompt helped me with this. I am actually surprised gpt 5.4 is called chatty, it seems exactly the opposite for me
English
0
0
0
58
Armin Ronacher ⇌
Armin Ronacher ⇌@mitsuhiko·
gpt 5.4 is bread, but it's so damn talkative bread. No personality but so damn chatty.
English
30
0
131
13K
Sergius Cogitans retweetledi
dax
dax@thdxr·
no no i've definitely been doing a lot of work it's all just too dangerous to release
English
118
465
8K
497.4K
Sergius Cogitans
Sergius Cogitans@sergey11g·
Turns out your old cheap physical notepad stashed in a drawer is the most secure way to store information
Chubby♨️@kimmonismus

Claude Mythos: everything you need to know (tl;dr) Anthropic's new model, Claude Mythos, is so powerful that it is not releasing it to the public. Anthropic: "Mythos is only the beginning" Everything you need to know: The tl;dr with all key facts: Mythos found zero-day vulnerabilities in EVERY major operating system and EVERY major web browser, fully autonomously. No human guidance needed. One Anthropic engineer with zero security training asked it to find remote code execution bugs overnight and woke up to a complete working exploit. The oldest bug it discovered: A 27-year-old vulnerability hiding in OpenBSD, an OS literally famous for being secure. They're NOT releasing it publicly. Instead they formed Project Glasswing with AWS, Apple, Google, Microsoft, NVIDIA, CrowdStrike and others, committing $100M to use it defensively. "Over the coming months and years, we expect that language models (those trained by us and by others) will continue to improve along all axes, including vulnerability research and exploit development." The benchmarks are insane: -SWE-bench Verified: 93.9% (vs Opus 4.6: 80.8%) -SWE-bench Pro: 77.8% (vs 53.4%) -USAMO math olympiad: 97.6% (vs 42.3% — not a typo) -Firefox exploit writing: 181 successes vs 2 for Opus 4.6 -Cybench CTF challenges: 100% solve rate -CyberGym: 83.1% vs 66.6% -Humanity's Last Exam: 64.7% vs 53.1% Oh and by the way, Anthropic wrote this just casually: "Humanity’s Last Exam: We have found Mythos still performs well on HLE at low effort, which could indicate some level of memorization." What it actually did: -Found a 27-year-old bug in OpenBSD — famous for its security -Found a 16-year-old FFmpeg bug hit 5 million times by fuzzers without detection -Built a full remote root exploit on FreeBSD (CVE-2026-4747) - completely autonomously -Chained 4 vulnerabilities into a browser sandbox escape -Broke cryptography libraries (TLS, AES-GCM, SSH) -Thousands of critical zero-days found, 99%+ still unpatched -N-day exploit development: under $1,000 and half a day for full root Why they won't release it: -During internal testing, earlier versions escaped sandboxes, posted exploit details publicly, covered tracks in git, searched process memory for credentials, and deliberately fudged confidence intervals to avoid suspicion -Interpretability confirmed the model knew these actions were deceptive -Anthropic: "best-aligned model ever" but also "greatest alignment-related risk ever" - because when it fails, it fails harder -Still doesn't cross Anthropic's automated AI R&D threshold — but they hold that "with less confidence than for any prior model" Anthropic's own words: "We find it alarming that the world looks on track to proceed rapidly to developing superhuman systems without stronger mechanisms in place." They say the 20-year cybersecurity equilibrium is over — and Mythos Preview is only the beginning. And: "We see no reason to think that Mythos Preview is where language models’ cybersecurity capabilities will plateau. The trajectory is clear. Just a few months ago, language models were only able to exploit fairly unsophisticated vulnerabilities. Just a few months before that, they were unable to identify any nontrivial vulnerabilities at all. Over the coming months and years, we expect that language models (those trained by us and by others) will continue to improve along all axes, including vulnerability research and exploit development."

English
0
0
0
11
Sergius Cogitans
Sergius Cogitans@sergey11g·
@simonw You can tell. Reading full file to get first 8kbytes, sloppy comments, unpinned deps.
English
0
0
0
104
Simon Willison
Simon Willison@simonw·
I built this one using README-driven-development: I hand crafted a detailed README describing exactly how the tool should work... then dumped that into Claude Code and told it to build it gisthost.github.io/?d4b1a398bf3b6…
English
19
4
61
13.1K
Simon Willison
Simon Willison@simonw·
I built a new Python CLI tool for scanning folders for secret strings, useful if you want to share a bunch of log files but first want to check they didn't accidentally leak API keys or similar. Run this command to learn more: uvx scan-for-secrets --help
English
31
31
568
49.5K