Jack 🏴‍☠️ 🌖

9.3K posts

Jack 🏴‍☠️ 🌖 banner
Jack 🏴‍☠️ 🌖

Jack 🏴‍☠️ 🌖

@wereness

cypherpunk, arthoe, spacebuilder

Stockholm | ⚣​​​​​​​​​​​​​​​​ เข้าร่วม Kasım 2015
1.3K กำลังติดตาม1.5K ผู้ติดตาม
ทวีตที่ปักหมุด
Jack 🏴‍☠️ 🌖
Jack 🏴‍☠️ 🌖@wereness·
my political ideology is a Kalmar Reunion with nuclear weapons and where Swedes aren’t allowed to vote
Jack 🏴‍☠️ 🌖 tweet media
English
7
1
42
4.6K
Jack 🏴‍☠️ 🌖 รีทวีตแล้ว
Nick Khami
Nick Khami@skeptrune·
@tekbog programming is so humiliating at this point that they're still willing to pay us
English
1
3
89
9.8K
🦂finn
🦂finn@dogsmellsgood·
Holy fucking shit. Finally found the name for it. Im going to cry Ive never been able to explain this to anyone they never know what im talking about
🦂finn tweet media
English
3.5K
2.2K
37.4K
3.8M
Jack 🏴‍☠️ 🌖 รีทวีตแล้ว
Pieta 🌨️
Pieta 🌨️@PietaPotato·
one thing that has always bugged me with google translate is how english works as a middleman even if it's not visible in the equation, this means that the plural of "you" for instance gets lost in translation because it doesn't appear in EN (even when it exists in other tongues)
Pieta 🌨️ tweet media
English
72
384
6.8K
217.6K
Jack 🏴‍☠️ 🌖 รีทวีตแล้ว
Eric S. Raymond
Eric S. Raymond@esrtweet·
Fast, cheap AI-assisted decompilation of binary code is here. Which means code secrecy is dead. Decompilers in themselves are not a new technology. Security researchers have employed them for years to analyze compiled malware. There's been some limited use by others, notably by hobbyists decompiling abandonware games. But there were a couple of issues that prevented this from becoming common practice. One is simply that running decompilers was difficult. It wasn't as simple as feed in binary, get out source; it needed a person with specialist skills prepared to do spelunking through wildernesses of machine code and object formats. The other problem was that decompilation didn't give you anything like the explanatory comments that had been in the original code, so you could easily wind up with code that you could read without being able to understand or modify it. Now large language models are busily smashing both of those barriers flat. They're better at the kind of detail analysis required to run the human side of a decompilation than humans are. More importantly, in the process of decompiling code, they rather automatically build a global model of how it works that can easily be expressed by high quality comments in the extracted code. All you have to do, basically, is ask for the comments. I'm going to reinforce that latter point because it may not be obvious how good LLMs are at this, and how much better they're going to get. When they decompile code and comment it for you, they're not just working from that one piece of code you have put in front of them - they'll have in their training set hundreds, possibly thousands of pieces of code similar to it and with comments. This will give them superhuman levels of insight not just into what it does at the microlevel, but what it means to the humans who wrote it, and what technical assumptions it's embodying. Compilation no longer guards your secrets. Or, to put it more precisely the expected time span in which you can still count on it to obscure them is measured in months. Possibly weeks. What does this mean? It means you're in an open-source world now. All it's going to take for anybody to bust your proprietary IP open is care enough to spend tokens on the analysis. You will maximize your chances of survival as a software business if you get out ahead of this rather than trying to fight it. This isn't exactly the way I expected open source to win. But, you know, I'll take it. Good enough.
English
95
383
2.2K
112.4K
Jack 🏴‍☠️ 🌖 รีทวีตแล้ว
Golden Epoch
Golden Epoch@__DreamSeeker__·
@5149jamesli Who amongst us hasn’t met our twink husband in the hot tub of the antichrist?
English
9
16
382
12.8K
Jack 🏴‍☠️ 🌖 รีทวีตแล้ว
_gabrielShapir0
_gabrielShapir0@lex_node·
the one good thing about the rise of AI hacking tools etc. is that it further undermines the KYC/AML "security theater" I was recently horrified to learn that even Docusign is pushing people toward face-scanning for basic document signatures PKI + peer-social-scoring tools are better an example of this is MetaLeX + Ethos-enhanced X accounts for investor vetting in angel rounds--we don't require any facial scanning or document collection in the base case we use smart contract escrows so that founders can reject suss tickets, or do extra verification out of band where it's just between them and the angel if you don't listen to robotic compliance lawyers, stick to the actual law, & use technology to avoid intermediation (thus avoiding the most burdensome KYC/AML laws as well), you keep things peer to peer and we can all suffer less and have fewer vulns
VECERT Analyzer@VECERTRadar

🚨 CRYPTO SECURITY ALERT: THE END OF FACIAL VERIFICATION (KYC) 🚨 🌐 The launch of JINKUSU CAM—a cybercriminal tool—has been detected. It is a powerful AI suite designed specifically to BREACH the security protocols of the world's largest exchanges (Binance, Coinbase, Kraken, OKX). 👤 Developer/Threat Actor: jinkusu. 🛠️ Tool Type: Real-time media manipulation software (Live Deepfake). 🎯 Objective: To bypass KYC (Know Your Customer) protocols on financial platforms, cryptocurrency exchanges, and mobile banking applications. 📦 TECHNICAL FEATURES (ATTACK VECTORS): The software utilizes cutting-edge AI technologies to deceive verification systems: 🎭 Real-time Face Swap: GPU-accelerated face replacement (CUDA/DirectML) using InsightFace for fluid gesture transfer. 🗣️ Voice Changer: Real-time voice modulation with pitch adjustments and preset profiles (Anonymous, Radio, Robot) to evade voice biometrics. 🎥 Virtual Camera: Output compatible with OBS Virtual Camera, allowing the manipulated video feed to be injected into Zoom, Teams, Chrome, and verification apps. 📱 Emulator Support: Designed to function within Android emulators, enabling attacks against mobile applications that require "live" selfies. ✨ AI Enhancement: Utilizes GFPGAN and 478-point facial meshes (MediaPipe) to ensure the fabricated face mimics human expressions with extreme precision. ⚠️ ASSOCIATED RISKS (CRITICAL): 🏦 Mass Banking Fraud: Enables criminals to use stolen photos (such as those from previous data leaks in France or Mexico) to create a "living" persona that speaks and moves convincingly before a bank's camera. 🎭 Synthetic Identity Theft: Facilitates the creation of highly convincing fake identities for money laundering activities and romance scams (pig butchering). 🔓 KYC Compromise: Bypasses the "Liveness Detection" checks that many applications consider secure. #Cybersecurity #Deepfake #KYC #Bypass #JinkusuCam #AI #IdentityTheft #Fintech #InfoSec #CyberAlert

English
9
15
73
6.8K
Jack 🏴‍☠️ 🌖 รีทวีตแล้ว
Rohan 🌱🔸️🇧🇷
Rohan 🌱🔸️🇧🇷@Rohanburdened·
lmao aellas site to visualize her data has a woke/normal/maga setting for sex/gender stuff
Rohan 🌱🔸️🇧🇷 tweet mediaRohan 🌱🔸️🇧🇷 tweet mediaRohan 🌱🔸️🇧🇷 tweet media
English
21
50
2.4K
133.8K
GodFodder☄️
GodFodder☄️@AtomicDestbin·
“Nirvana is a pop band” -guy who’s never listened to Nirvana
English
18
10
292
76.3K
Jack 🏴‍☠️ 🌖 รีทวีตแล้ว
sol🏴‍☠️
sol🏴‍☠️@sol_plunder·
Signal is tied to mobile phones, which are fundamentally hostile to user freedom and are essentially electronic leashes. Electronic authentication is incredibly complex and fragile, and, once you start taking auth security seriously, it becomes a massive pain. Once you understand how deeply controlled the system is, and how fragile your place in it is, interacting with technology becomes extremely stressful. Overall, technology just feels like deeply hostile territory, and the natural world doesn't feel like that at all. I would prefer to spend my time in the natural world instead. Computers offline are maybe fine eventually, but it is a lot harder than it sounds.
English
2
1
13
303
Jack 🏴‍☠️ 🌖 รีทวีตแล้ว
IT Guy
IT Guy@T3chFalcon·
Huge Anthropic leak just dropped: the entire Claude Code CLI source is now public. A misconfigured .map file in their npm package exposed a direct download link to the full unobfuscated TypeScript codebase from Anthropic’s own R2 bucket. Discovered by Chaofan Shou (@Fried_rice), the dump is massive 1,900 files, 512,000+ lines including the complete tool system, 50+ slash commands, multi-agent coordinator, React/Ink terminal UI, IDE bridge, permission engine, and several unreleased features. Full repo is live on GitHub(@nichxbt ): github.com/nirholas/claud… Clean mirrors are already up for easy browsing(@baanditeagle): cc-poster.vercel.app cc-hidden-deploy.vercel.app It’s spreading fast, the entire dev community is already tearing through it.
Chaofan Shou@Fried_rice

Claude code source code has been leaked via a map file in their npm registry! Code: …a8527898604c1bbb12468b1581d95e.r2.dev/src.zip

English
320
1.3K
10.1K
1.6M
Jack 🏴‍☠️ 🌖 รีทวีตแล้ว
banteg
banteg@banteg·
claude code uses axios btw. i think the “package managers are evil” guy was right. at this point it makes no sense to use anything but pinned or delayed deps. possibly even vendored.
Feross@feross

🚨 CRITICAL: Active supply chain attack on axios -- one of npm's most depended-on packages. The latest axios@1.14.1 now pulls in plain-crypto-js@4.2.1, a package that did not exist before today. This is a live compromise. This is textbook supply chain installer malware. axios has 100M+ weekly downloads. Every npm install pulling the latest version is potentially compromised right now. Socket AI analysis confirms this is malware. plain-crypto-js is an obfuscated dropper/loader that: • Deobfuscates embedded payloads and operational strings at runtime • Dynamically loads fs, os, and execSync to evade static analysis • Executes decoded shell commands • Stages and copies payload files into OS temp and Windows ProgramData directories • Deletes and renames artifacts post-execution to destroy forensic evidence If you use axios, pin your version immediately and audit your lockfiles. Do not upgrade.

English
18
21
405
35.1K
jonathan
jonathan@jnsyaaa·
uploaded 2 months worth of journals to claude and asked it for 10 reflections on my life it’s time to acknowledge this company is a serious security threat and needs to be shut down
jonathan tweet media
English
52
195
10K
290.8K
sol🏴‍☠️
sol🏴‍☠️@sol_plunder·
Techno Exodus: I am leaving X With the Plunder research project complete, I will now turn my attention to my withdrawal from the internet. If you wish to maintain contact, DM me.
English
7
0
47
1.5K
Jack 🏴‍☠️ 🌖 รีทวีตแล้ว
chaser
chaser@chaserxy·
today is Nikolai Mushegian's (@delete_shitcoin) 33rd birthday. here's to a genius who dared to see things for what they are and call them by their true names—and, most importantly, when he saw something wrong, he built the tools to make it right. Nikolai was a builder in the truest sense. he spent most of his life and energy crafting elegant systems to realize his vision of a permissionless future—on-chain financial protocols, various smart contract logic, standards and programming languages. he didn't focus on describing or popularizing his projects, let alone making profit or even getting recognition. he was decades ahead of this world, which makes it even more difficult to do justice to the rich heritage he left. I won't try that right now. but, to give a few ideas, he pioneered permissionless electronic credit systems as the inventor of MakerDAO (makerdao.com) and the dai stablecoin, giving rise to what's known as decentralized finance. with the Rico Credit System (@ricocreditsys) and the concept of the reflex bond, he showed that currency stability is possible without relying on fiat central bank definitions of value. he solved Zooko's triangle, a naming trilemma in networks, first with the Ethereum Name System (the original from 2015, before it was taken over: github.com/dapphub/ENS-old), and later with dmap (github.com/dapphub/dmap). his work on the DappSys suite (github.com/dapphub/dappsy…) is foundational in smart contract security and modularity. he designed and built tools and that most field "experts" still can't even imagine or grasp. he taught us that simple, sound, corruption-resistant systems are key to bringing about freedom—that coercion can be countered with wit. he understood power. he looked the darkest aspects of this world in the eye, and that motivated him to become a true beacon of light against it all. Nikolai, you left too soon. we had too little time with you, but, even in that glimpse, you gave us incredibly much. one day we'll be ready to receive it. happy birthday, brother! ☀️☀️☀️ nikolai.fyi chaser.eth.link/nikolais-princ…
chaser tweet media
English
12
39
197
15.3K
Alexander Bard
Alexander Bard@Bardissimo·
Jag tycker väldigt väldigt mycket om Jessica Stegrud. Och jag tycker väldigt väldigt mycket om Fredrick Federley. Det enda jag kan säga emot dem är att de båda har förbannat dålig karlsmak. Men det förlåter jag dem så mycket jag bara kan i min liberala värld. Länge leve @ChangFrick!
Chang Frick@ChangFrick

Hur kan nazistpysslingen vara emot pedofili när han själv är barnet när han blir påknullad av någon som kunde vara hans egen mamma? Då kanske man inte ska kalla andra för ”smuts”?

Svenska
23
2
58
54.1K