Hacker Newsnew | past | comments | ask | show | jobs | submit | lhmiles's commentslogin

What's the art?


?


The context is that the program I analyzed is the official WhatsApp installer, unmodified, downloaded from https://www.whatsapp.com/download?lang=es . Which means the WhatsApp supply chain is infected. Or WhatsApp was hacked.


Block the dns on router for two weeks and you will feel alive again


LoL :) that makes sense, but what if there is a new AI model releases when I am offline.


You will not suffer much from not adopting a new AI model for two weeks after release.


No formatter ever


Outstanding work


You should put a complete working example with a video in the readme!!


Thank you for the feedback, will work on it!


Paste in last 10 reviews to Gemini or gpt and ask for 20 "rare-gems, unique and exquisite," with descriptions. Works well


Sorry, I couldn't understand your comment fully.

Do you mean one should post their reviews of last 10 books read into Gemini and then ask it to find 20 rare-gems books based on the content of those reviews?


The author asked me to mention that it's possible to maliciously cause a (64-bit) hash collision. In other words, you can make changes to safe file.py and evil file.py until they have the same hash. Then if you read file.py on cmt abc123 in normal git land, then run python /commits/abc123/file.py, it is possible to read the safe one and run the evil one. I think this is only a risk if you are reading from an external source but executing inside the mount, which is a weird thing to do.


Well written


Thank you for sharing!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: