Bryan Hooper đź’«

@hooper
27 Followers
121 Following
253 Posts
Finding my way after the social media apocalypse.
Bloghttps://overstatement.org
I don’t want any money with DT’s name on it.
Junior engineers have had a hard time for a while. This is not new nor merely an AI problem. My bias is that great companies will think through how they want to develop their future teams. Crappy companies will continue to view engineers as an expendable resource. AI isn’t the difference maker. Leaders are.
Peaceful goals cannot be achieved by warring ways.
I am so tired of this administration. Iran may become rubble but the US government is already in ruins. Whatever remained of our soul is rotting away fast.
At some point people will find a competitive advantage by NOT using AI.
Everything Pam Bondi did today made a mockery of the Christian faith. Don’t pretend to give a damn about the Bible when you clearly haven’t read it.
The fact that AI can design a “decent” web site is just a reminder of how bland and and boring (and corporatized) the internet has become.
The U.S. Has Killed More than 150 People in Boat Strikes. We’re Tracking Them All.

The Intercept is keeping count of all publicly declared U.S. attacks on boats in the Caribbean Sea and Pacific Ocean and the number of civilians killed.

The Intercept

"If you are experimenting with OpenClaw, do not do it on a company device. Full stop."

"If you have already run OpenClaw on a work device, treat it as a potential incident and engage your security team immediately."

https://1password.com/blog/from-magic-to-malware-how-openclaws-agent-skills-become-an-attack-surface

From magic to malware: How OpenClaw's agent skills become an attack surface | 1Password

The same capabilities that make OpenClaw a groundbreaking tool also make it an urgent security risk. This blog contains confirmed examples of agent skills being used as malware vectors, and advice on how to protect yourself if you're experimenting with them.

I still find it a bit odd that developers are willing to allow another company's servers to examine their code, analyze it, modify it, undoubtedly add it to its model. At that point, who owns the code?