

I rewrote that sentence multiple times and it still came out awkward. oof


I rewrote that sentence multiple times and it still came out awkward. oof


If you absolutely demand change you need to have an answer to allay the manager’s fears that the changes you require will be a net negative for the group; that unserious gossipy annoying group that is setting the current bar for success.
From the inane gossipper’s perspective you could appear easily distracted, argumentative, and unserious. You’ve declared that their stress management rituals may be such a hindrance that you’d reject a promotion to avoid participating. That answer could gain you enemies even if you don’t even interview if it’s not kept confidential.
I hope this is received as contingency planning and not an insult. I don’t think those things and I also hate work gossip, but in this scenario you’re the out-group until you get in. It behooves you to become a quiet friend instead of gossip fodder. I hope you can play this field successfully and good luck!


Accepting that your premise is true for individual texts, there seems to be a fairly flat number of poisoned docs needed regardless of total training corpus size. So the question is how to sneak that many docs into the corpus.


I appreciate that you wanted to help people even if it didn’t land how you intended. :)


If you’re seeing this follow all this idiot’s posts and mass report.

If you’re seeing this follow all this idiot’s posts and mass report.


If you’re seeing this follow all this idiot’s posts and mass report.


“Perplexity shits pants and resorts to fediverse ad spamming as profitability and company future in question.”
We have Lemminati at home.


I can’t sleep :(


Typosquat domain for sure! In a sandbox I’m seeing that all the download links point to the same HTML page on a .ink domain that cloudflare is now refusing to serve.
But our buddy joe already got a copy for us so we can at least view that report for fun: https://www.joesandbox.com/analysis/1763244/1/html
Edit: It pulls down an MSI installer or something it runs with msiexec but disguised with a PDF file extension. It seems to want a copy of cmd.exe to exist in an AutoIT installation (SearchPathW vs “C:\Program Files (x86)\AutoIt3\cmd.exe”) as well as pointing toward the multilanguage (.exe.mui) and other cmd variants. I suspect we’re one step away from a real payload with this report and that’s what we’d see the “Invoke-Obfuscation” powershell the sandbox spotted used for (if that wasn’t a false positive due to the base64 offset string).


It’s been a long time since I read outputs from independent labs assessing supplement product purity but I was pointed towards this around a month ago:

I’m not sure who are the most trustworthy labs at this point though and maybe there’s a nutritionist or someone who can give more than my peanut gallery advice.


In my opinion the ps5 controller’s stupid shell and randomly placed torx screwheads makes it hard to open and work on compared to older controllers, and they use a potentiometer that’s cheap and prone to drift. I’ve cleaned some with isopropyl and youtube guides to good effect but you’ll need special screwdrivers to do so if I’m remembering right.
It’s not impossibly hard but mind the plastic bits you can chip off easily if you haven’t done it before!
The custom interiors and crew based stuff is really interesting and I want to see it as a light no fire testbed if nothing else after they said it was the same core tech as their ocean faring ships.


Maybe OP is describing a prolasped rectum, where some intestine is pushed out, rather than a hemorrhoid like you describe.


Discord can make threads, but they are effectively invisible to people who don’t post in them or get @ in them. They can be set to auto archive and have their own permission structure, so I tend to create them for individual games and sub topics like that.
The discoverability problem means people have to seek them out, which might suit your purposes, but just expect it to be like a somewhat self archiving channel anyone can start.


I guess it’s interesting to see how she views her son as blameless and contorts her worldview to ignore that he chose his fathers womanizing habits and money over her.
Who would want to reconcile that her abuser trained her son to abuse, and that mindset brought them both ridiculous wealth?
I’m not sure how all of this is news though, more like hiring your mother to get between you and a mob with pitchforks.


Text wall incoming, no offense taken for walking away:

People always talk about distributed denial of service attacks but this is not distributed. It’s concentrated in that one farm, and that informs the types of denial of service attacks it’s suited to carry out without help and influence the govt agencies which might give a shit. A simbox is a machine that can initiate one simultaneous call for each provisioned sim card in it, or whatever other cellular network operations the towers in range support. Look downstream of that for a second though, how many 911 operators are there for that area? Denying service can be more than knocking machines offline! Do I have enough sims to drown them in prerecorded panicked AI calls so they send all their firefighters to the wrong locations? Maybe I want to knife a guy and watch everyone on that block fail to reach 911 while he bleeds out. But they said ‘disable towers’ so let’s focus on denying telephony rather than the service telephony gets you to.
Bullshit scenario to illustrate a point:
Healthy customers operating a phone normally may call a variety of internal services once each until their session is established with the appropriate permissions, and then they’re allowed to make calls or touch websites. What if I pick one of those important steps and just hammer the dick off of it so nobody else can make new connections to the network for a period? If their security teams had the idea before me maybe they built some defenses, but maybe not, or maybe the simbox has sims from many carriers so they can get help. Does MobileX even agree that they carry the obligation to respond to this? Do they even know how since they don’t own all the network devices involved? Did they willfully put their thumb up their ass and ignore so they could continue to get money from the bad actor without caring about the consequences? No of course not companies always act morally!
Imagine my phone attaches to one of three towers in an area. Imagine there’s a back end process that lets a device tell a tower “I’m bcovertigo, so start me a session and look up my plan permissions, then report back with what I’m allowed to access” with a unique identity for the provisioned sim card. What happens when a phone starts that process but just ignores the response and never goes to the next step? What if I repeatedly chain together those half opened requests, and then 100 or so of those processes are just waiting on a response, still consuming resources. Do that for each of 32 sim cards in those pictured simboxes. Now give me a 300 strong swarm of those screaming hydras. 100/minute32sims300simboxes. Can your iphone ever get online if that critical step never completes to tell you your session is allowed to make calls and visit websites? We’re not even considering disruption of IoT security systems. Maybe they found some other flaw that lets them break existing network connections or exhaust something that’s needed for very specific functions to work. Through the magic of computing, anything can go wrong!
But enough about the attack itself. What are you going to do to stop all this?
Ban the identifiers of the sim bank? Fuck you they randomize it. Deprovision the sims as you see them used? Fuck you they have 100k of them as reserve ammo. No you have to physically find it and go there in person, which means plying some investigative govt agency for help.
Krisp processing happens on device using your cpu if it’s enabled per their FAQ: https://support.discord.com/hc/en-us/articles/360040843952-Krisp-FAQ