Ted Stresen-Reuter

8.9K posts

Ted Stresen-Reuter banner
Ted Stresen-Reuter

Ted Stresen-Reuter

@tedmasterweb

I've moved on https://t.co/kO7MwfxebA

Las Palmas de Gran Canaria Katılım Mart 2009
646 Takip Edilen501 Takipçiler
Sabitlenmiş Tweet
Ted Stresen-Reuter
Ted Stresen-Reuter@tedmasterweb·
As many of you know, I am fascinated by #AI/#ML. I don't have a #mentor to work with so I'm often left to my own devices. The repository below is an example of how I "lead myself" when a mentor isn't available. Read this thread for details 🧵 github.com/SecretSourceWe…
English
1
0
2
493
Ted Stresen-Reuter
Ted Stresen-Reuter@tedmasterweb·
@elonmusk And thus Grok will be forever broken. This such a pointless hill to die on. Good grief!
English
0
0
0
13
Elon Musk
Elon Musk@elonmusk·
Grok will never go to therapy. Never.
English
3.9K
6K
62.7K
31.9M
Ted Stresen-Reuter retweetledi
Andrej Karpathy
Andrej Karpathy@karpathy·
Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.
Daniel Hnyk@hnykda

LiteLLM HAS BEEN COMPROMISED, DO NOT UPDATE. We just discovered that LiteLLM pypi release 1.82.8. It has been compromised, it contains litellm_init.pth with base64 encoded instructions to send all the credentials it can find to remote server + self-replicate. link below

English
1.4K
5.3K
27.9K
66.6M
Ted Stresen-Reuter
Ted Stresen-Reuter@tedmasterweb·
I'm working on a personal project that requires the creation of hundreds of selfies. I compared 20 models and produced samples for each using the same prompt. chicagoitsystems.com/ai-model-sampl… I would love your feedback! Ted Stresen-Reuter
English
0
0
0
30
Ted Stresen-Reuter
Ted Stresen-Reuter@tedmasterweb·
@AskATranswidow @TAMU I like learning about the experiences of others because it prepares me to work on a team but maybe engineers only work in isolation and never have to interact with anyone not like them? Seems unlikely. Not saying this particular case was this or that, just sayin'
English
0
0
1
26
Ask A Transwidow
Ask A Transwidow@AskATranswidow·
Oh! I guess you only care about letting students down when the story is exposed and goes viral. My son and his classmates were afraid of retaliation and so they endured weeks of discussions about all manner of gay 💩, had to read about an underage teen giving a blowjob to a man in a gay bar as part of a Southern Cultures class last semester. LGBTQ advocates came to speak for their specific cause during class hours. I had the displeasure of funding this crap so my son can get a degree from #TAMU like I did. Big difference, the school is now all abojt queering education now. How does that work for engineers building bridges? I already know about the transgender pig study at TAMU. That is just animal cruelty for no good reason. We stopped donating. The school is embarrassing its alumni.
English
47
174
1.4K
38.6K
Texas A&M University
A statement from Texas A&M University President Mark A. Welsh III: I learned this afternoon that key leaders in the College of Arts and Sciences approved plans to continue teaching course content that was not consistent with the course’s published description. As a result, I directed the provost to remove the dean and department head from their administrative positions, effective immediately. Our students use the published information in the course catalog to make important decisions about the courses they take in pursuit of their degrees. If we allow different course content to be taught from what is advertised, we let our students down. When it comes to our academic offerings, we must keep our word to our students and to the state of Texas.
Texas A&M University tweet media
English
2.5K
3.1K
21.4K
1.9M
Ted Stresen-Reuter retweetledi
Aadit Sheth
Aadit Sheth@aaditsh·
Here are 5 rules to master vibe-coding with AI:
Aadit Sheth tweet media
English
13
33
565
88.8K
Ted Stresen-Reuter
Ted Stresen-Reuter@tedmasterweb·
@pepephone Ya estoy hablando con el equipo por WhatsApp pero es muy frustrante. Cuando compré la tarjeta, nadie me dijo que iba a tener que esperar tanto para que activaran la cuenta y si lo hubiera sabido, seguramente no lo habría comprado. Habría buscado una alternativa.
Español
1
0
0
29
Pepephone
Pepephone@pepephone·
@tedmasterweb ¡Buenas tardes, Ted! Si tienes problemas en estos momentos con la activación de tu tarjeta SIM, porfa escríbeme por DM con tus datos para poder echarle un vistazo. ¡Te espero!
Español
1
0
0
29
Ted Stresen-Reuter
Ted Stresen-Reuter@tedmasterweb·
@pepephone ¿Es normal que un alta de una línea nueva con una tarjeta SIM nueva tarda 24 horas en activarse? Pregunta seria.
Español
1
0
0
29
Ted Stresen-Reuter
Ted Stresen-Reuter@tedmasterweb·
I understand that the JWT must be sent with the request. As the call to the Edge Function is initialized by the cron job, does that mean it is operating as the `postgres` role? Don't you think _some_ check should be in place so that anon roles aren't initializing updates?
English
0
0
0
31
Ted Stresen-Reuter
Ted Stresen-Reuter@tedmasterweb·
@ggrdson Hi! 👋 Reading your Supabase post on Automatic Embeddings and wondering if the Edge function really is "open to the world" or if there is some hidden security check going on under the hood that I'm not seeing supabase.com/docs/guides/ai… How would we add security to this?
English
1
0
0
33
Cristian Tăbăcitu
Cristian Tăbăcitu@tabacitu·
When I’m stressed, I order things around me. Eg. at the gym, I don’t only put my weights back, but also order most weights in the rack. It bothers me when they’re a mess. Is this OCD or just… being normal?👀
English
1
0
1
112
Ted Stresen-Reuter retweetledi
Fearghas Kelly
Fearghas Kelly@FearghasKelly·
I better go superviral for this...
English
1.1K
26.1K
122.7K
7.4M