- cross-posted to:
- programmer_humor@programming.dev
- cross-posted to:
- programmer_humor@programming.dev
Now, take the code for AI and paste that in. It does not work? Then AI is no good.
P and NP.
Anyone working in software development should be aware that the employment contract most probably contains a non-disclosure clause that forbids to hand business secrets like source code to outsiders, or worse, competitors.
In my company they see OpenAI ond others the same way they see Github or Atlassian, so I think this line is getting a bit blurrier
The line is as sharp as ever. Everybody just ignores it.
this is basically
“see if your credit card has been hacked by entering it below!“
I get the same vibes from https://haveibeenpwned.com/Passwords
I know the site is made by a security researcher but still. It doesn’t feel completely safe to give then my passwords.
Except you’re not
https://haveibeenpwned.com/API/v3#PwnedPasswords
Your computer is basically sending a part of your password (the first five characters) and if the server responds positively to a match it sends all the other possible combinations and your computer looks to see if it matches the rest based on when you typed.
For more information
https://en.wikipedia.org/wiki/K-anonymity
It’s always good to be cautious, but it’s especially important to know how tech works, especially good tech, when it can have immense benefit
That is the correct way of thinking, never trust anything with your passwords.
I was curious on what haveibeenpwned does, so I took a look at what the network tab in dev tools said what was actually sent. When I type a password (say password123) and press check it runs a function that hashes with the “SHA-1” hash function and then sends the first 5 characters of the result. The response is over a thousand lines in the format of
35 hash characters:number of breaches
If any of these hashes are the start of your original hash, you now know it’s exposed and how many times it’s been exposed.
While I get your concern. I, and loads of other nerds, trust them.
I wouldn’t recommend providing any current passwords, but it could be used to determine any recent/previous compromises.
Firstly… no.
Secondly… cut and paste? Not copy?
Obviously, because you need to empty your “source code file” to make room for Grok’s corrected code.
Dude, copying source code files is most probably against the NDA
For one brief, terrifying moment, the source code of my life’s work existed only in Groks memory.
Mr. Anderson.
Happy cake day!
not even masking that they just want
to stealyou to give them all your code.yes, so u can replace it right away with groks “fixed” version ofc 😊
Now with 50% more Hitler!
This is the guy who doesn’t own a laptop remember… he may not know the difference, or maybe his lawyer was lying.
I was wide-eyed at this, and then I realized that I don’t own a laptop either! I have owned a few, but after my last one died 5+ years ago I’ve just been using my 10 year old desktop computer which doubles as a home server. I do have a work laptop, but I don’t own it.
Wait what, Melon?
copypasta
Theoretically, cutting and pasting a file into your browser will just act like copy–pasting, but that’s still a dumb way to phrase it.
“Cut & paste” and not “copy and paste” because if you cut it, you won’t have a copy of it anymore and your code is now Grok’s code.
yeah let me just give all of my code to elon for free
Hey man how is poor Elon going to make money if people don’t give him free shit? Just think of the billionaires.
Ah yes, “fix” it for “free”
l33t h4x0r
H3 1z d4 1 =o
“Will you walk into my parlour?” said a spider to a fly…
Set aside the cut n paste, what exactly would the Grokanical Türk “fix”?
The comments in your code being too woke
Remove all state machine implementations because they support transitions.
Error 608: Insufficient Hitler
I keep seeing claims that grok is a “mechanical Turk”, but searching turns up nothing. What evidence is there of this?
Evidence of what?
Of being a person responding instead of an llm.
I think it’s just a joke, as we’ve seen many AI projects are just Indians.
Yeah it seems pretty unlikely that any AI chat bots are manipulating code in the complex (whether the output is correct or not is immaterial to the complexity of the changes being made) ways that they are that quickly despite actually being done by humans.