- ブログ記事を下書き - LLMを使って4時間かけて議論を入念に改善 - すごい、気分最高、とても説得力がある! - 面白いアイデアだ、反対の立場を主張させてみよう - LLMが議論全体を粉砕し、実は反対の立場が正しいと私を納得させる - lol
LLMは尋ねられると意見を引き出すが、ほぼあらゆる方向の議論を極めて有能に行う。これは自分自身の意見を形成するためのツールとして非常に有用だが、異なる方向を尋ね、おべっかには注意する必要がある。
LLMは尋ねられると意見を引き出すが、ほぼあらゆる方向の議論を極めて有能に行う。これは自分自身の意見を形成するためのツールとして非常に有用だが、異なる方向を尋ね、おべっかには注意する必要がある。
A series of supply chain attacks has affected npm and PyPI repositories within two weeks. The use of large language models is exacerbating these security issues, and existing mitigation measures are insufficient to address the problem.
A new phishing-as-a-service called Starkiller uses disguised links to load real login pages from target brands. It acts as a relay between victims and legitimate sites, forwarding usernames, passwords, and MFA codes to bypass security measures.
A security researcher discovered a vulnerability that allowed obtaining full administrator rights in a Replit clone. The vulnerability stemmed from running untrusted code in an insecure manner. This highlights the importance of proper security practices when executing external code.
A social media trick shows that blocking the "claude" user on GitHub reveals projects using Claude Code. The CPython repository, one of the world's most popular open-source projects, now displays contributions from this AI coding agent.
An investigation uncovered a large network of fake support groups on Telegram that spread cryptocurrency stealers and drainers. The network was found to be actively promoting malicious tools designed to drain crypto wallets.