Our News Team @ 11 with host Snot Flickerman

  • 4 Posts
  • 960 Comments
Joined 1 year ago
cake
Cake day: October 24th, 2023

help-circle

  • Snot Flickerman@lemmy.blahaj.zonetoTechnology@lemmy.worldThe Slop Society.
    link
    fedilink
    English
    arrow-up
    19
    arrow-down
    1
    ·
    edit-2
    14 hours ago

    I also did not like something Newton said at the end of a (paywalled) blog about what he learned from the reaction to his piece about AI skeptics. Newton said, and I quote, that he was “taking detailed notes on all bloggers writing ’financial analyses’ suggesting that OpenAI will go bankrupt soon because it’s not profitable yet.”

    I do not like bullies, and I do not like threats. Suggesting one is “taking detailed notes on bloggers” is an attempt to intimidate people that are seriously evaluating the fact that OpenAI burns $5 billion a year and has no path to profitability. I don’t know if this is about me, nor do I particularly care.

    Musk has also made weird veiled threats to keeping lists. I bet Zuckerberg is just smart enough to not tell people he keeps a list of people he keeps tabs on and uses his immense wealth to crush.

    I mean, we know Monsanto had a “fusion center” that fought tooth and nail to have any negative coverage of Monsanto destroyed, intimidated, or flooded with negative reviews and responses.

    We have had executives from eBay mailing critics dead animals.

    If I were Zitron I’d be worried about way more than just another journalist who is stuck up powerful people’s asses, but that’s the price of speaking truth to power.










  • https://www.malwarebytes.com/blog/news/2021/12/was-threat-actor-kax17-de-anonymizing-the-tor-network

    Given the number of servers run by KAX17 the calculated probability of a Tor user connecting to the Tor network through one of KAX17’s servers was 16%, there was a 35% chance they would pass through one of its middle relays, and up to 5% chance to exit through one.

    This would give the threat actor ample opportunity to perform a Sybil attack. A Sybil attack is a type of attack on a computer network service where an attacker subverts the service’s reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. This could lead to the deanonymization of Tor users and/or onion services.

    Given the cost and effort put into this and the fact that actors performing attacks in non-exit positions are considered more advanced adversaries because these attacks require a higher sophistication level and are less trivial to pull off, it is highly likely this is the work of a high-level (state-sponsored?) threat actor. As for who is behind this group, neither Nusenu nor the Tor Project wanted to speculate.

    A spokesperson for the Tor Project confirmed Nusenu’s latest findings and said it had also removed a batch of KAX17 malicious relays.

    “Once we got contacted, we looked through all the relays in the network and identified several hundred relays that are very likely belonging to the same group and removed them on November 8.”

    VPN’s also by definition still use the same corporate pipes as anything else.