Doc Fusion
120.4K posts

Doc Fusion
@DocFusion
Trying to be a nice man since 1979. Still failing. Plus proche du saumon que du mouton. 👧=🌹 👶=🌌 🦣 @[email protected] 🟦 @DocFusion


Transports : le Sénat vote pour obliger la SNCF à vendre les billets de ses concurrents sur son application ➡️ l.leparisien.fr/vMTA

Lutte contre la fraude: nouveau record de 723 millions d'euros pour l'Assurance maladie


La Coupe du Monde c’est (déjà ?) dans deux mois. 🏆 LA HYPE EST PRÉSENTEEEEE 🤩

🔴Les subventions publiques en 2024 aux médias d’extrême gauche. ➡️près d'un million d'euros au total Arrêt sur images : 349 425 € Politis : 234 872 € StreetPress : 67 904 € Blast : 316 464 € Bondy Blog : 10 571 € Basta ! : 20 180 € Selon @ojim_france



BREAKING: Oracle has reportedly begun layoffs, with 30,000 employees likely to be fired, per the Deccan Herald.

This is either brilliant or scary: Anthropic accidentally leaked the TS source code of Claude Code (which is closed source). Repos sharing the source are taken down with DMCA. BUT this repo rewrote the code using Python, and so it violates no copyright & cannot be taken down!

🇫🇷🚨 11h, vote #ChatControl : ils veulent détruire la vie privée. L'eurodéputée Pirate @MarketkaG ne cède pas, ne cédez pas non plus ! 🏴☠️ Appelez les eurodéputés marqués "soutient". Nous n'accepterons JAMAIS la surveillance de masse. Agissez : ☎️ fightchatcontrol.eu

Le communisme en une image.

RETYC est en ligne ! Transfert et dataroom de données sensibles. 100% 🇪🇺 Chiffrement avant envoi, bout à bout dans le navigateur. Aucune donnée en clair côté infra. Expiration automatique. Bêta publique : accès progressif retyc.com Chiffré. Européen. Hors de portée.

🔴🗣️ Ristourne sur le prix carburant : "Ce n'est clairement pas une bonne mesure", estime @AgnesRunacher, ancienne ministre de la Transition écologique #ToutEstPolitique #Canal16

Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.




Nobody wants to read AI-generated books.



