I suspect we will eventually get to a point where the engineers working on "AI" - at least, those working on the few applications that actually make the #companies #money - are going to start doing what many engineers working in the "defence" #industry do: obfuscating. Lying. To avoid others knowing what they actually do with their days.

"What do you do?"

"I design bomb casements for cluster munitions, to increase the total number of civilian casualties when despots use them against non-military targets" tends to get you #shunned at parties, so they say "Oh, I do structural steel work" or something else non-specific.

Similarly, "I develop language models that keep helpless customers occupied until they give up in frustration so the companies can lay off most of their customer-support staff" isn't going to be a popular announcement to all those at the party whose jobs were destroyed by "AI".

"Oh, I develop and apply algorithms to novel problems."

"Oh, I do data analysis."

"Oh, I'm a plumber."

#AI #LLM #jobs #shame #shun #engineer #software #vendor #unemployment #lying #obfuscating #layoffs #plumber

#PresidentMusk #doge tries to speak truth by displaying their findings on their site, but they are #obfuscating what they are truly doing. Their evidence is nothing but errors, lies, and halfthruths. They are implementing #rage to make the government #impotent and be our #oligarchs. All this lies at the feet of #Trump and the #americans that want to turn us into a #russian satellite.

Michael Karcher (#OSINT #ReverseEngineer) about #xz #backdoor #obfuscating #regex:

"the code does not contain any ASCII strings, neither in clear text nor in obfuscated form. Instead, it recognizes all relevant strings using one single deterministic finite automaton..." (DFA ~= regex)

"... script that decodes the tables for the table-driven DFA and outputs the strings recognized by it accompanied with the "ID" assigned to the terminal accepting state"
https://github.com/karcherm/xz-malware

GitHub - karcherm/xz-malware: Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1

Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1 - karcherm/xz-malware

GitHub

Why Can’t the #Political #Press Just Say the #Truth About #Trump? He Wants to Be a #Dictator.

The #punditclass keeps #obfuscating the GOP’s #violent #authoritarianism as it recurs to wan and dispassionate rhetoric.

https://www.thenation.com/article/politics/trump-fascist-media-political-press/

Worklab 2023

@developit

We can't tell if he's #coding or #obfuscating,
My what a guy, that Gaston!

KASPERSKY #Bypassed again ;D
with Native API you can change #Process Memory very simple and i tested simple c# code to Convert payload #inmemory before running payload also after running payload with delay so In-memory every 60 secs only once RAW payload will run in memory and this code still needs to test but i did not have any error in Server-side or client-side and #Cobaltstrike commands worked very well but still needs to work on this code (this code just was for test),
btw code was not Detected by Kaspersky so i can say KASPERSKY Bypassed again ;D
anyway #Encrypting or #obfuscating in-memory can help you sometimes ;)
#penesting #redteaming #bypassav #evasion #inmemory #redteam #pentest