-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Microsoft Chatbots Turn Out to be Misleading Trash


Posted by Roy Schestowitz on May 31, 2023


Security Leftovers

WWW: WordPress, Browser Defaults, and Curl Bugfix



Why an Octopus-like Creature Has Come to Symbolize the State of A.I.


↺ Why an Octopus-like Creature Has Come to Symbolize the State of A.I.


> Comparing an A.I. language model to a Shoggoth, @TetraspaceWest said, wasn’t necessarily implying that it was evil or sentient, just that its true nature might be unknowable.


> “I was also thinking about how Lovecraft’s most powerful entities are dangerous — not because they don’t like humans, but because they’re indifferent and their priorities are totally alien to us and don’t involve humans, which is what I think will be true about possible future powerful A.I.”


> The Shoggoth image caught on, as A.I. chatbots grew popular and users began to notice that some of them seemed to be doing strange, inexplicable things their creators hadn’t intended. In February, when Bing’s chatbot became unhinged and tried to break up my marriage, an A.I. researcher I know congratulated me on “glimpsing the Shoggoth.” A fellow A.I. journalist joked that when it came to fine-tuning Bing, Microsoft had forgotten to put on its smiley-face mask.



Transforming search sentences to query Elastic SIEM with OpenAI API


↺ Transforming search sentences to query Elastic SIEM with OpenAI API


> The primary task of a security analyst or threat hunter is to ask the right questions and then translate them into SIEM query languages, like SPL for Splunk, KQL for Sentinel, and DSL for Elastic. These questions are designed to provide answers about what actually happened. For example: “Identify failed login attempts, Search for a specific user’s login activities, Identify suspicious process creation, Monitor changes to registry keys, Detect user account lockouts, etc.”


> The answers to these questions will likely lead to even more questions. Analysts will keep interrogating the SIEM until they get a clear answer. This allows them to piece together a timeline of all the activities and explain whether it is a false positive or an actual incident. To do this, the analysts need to know a bunch of things. First, they need to be familiar with several types of attacks. Next, they need to understand the infrastructure (cloud systems, on-premises, applications, etc.). And on top of all that, they must learn how to use these SIEM tools effectively.



Perhaps GPT Is Not Ready For The Supreme Court


↺ Perhaps GPT Is Not Ready For The Supreme Court


> Over the last few months, we’ve written a bunch about DoNotPay, the company run by Joshua Browder, claiming that it is the “world’s first robot lawyer” — that is until people take him to court for various things, at which point he says the term is just meant to be for marketing, and not to be taken seriously.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Thu Jun 13 07:35:59 2024