- Aug 2024
-
www.youtube.com www.youtube.com
-
this propaganda plays on psychological structure and if you're able to fish into that you're able to exploit those irrational Tendencies
for - climate crisis propaganda - human psychology used to exploit irrational tendencies of people to delay climate action
-
- May 2024
-
arxiv.org arxiv.org
-
To elaborate, a successful live exploit must compromise the unexposed next set of private keysfrom the public-keys declared in the latest rotation
Tags
Annotators
URL
-
- Mar 2024
-
www.youtube.com www.youtube.com
-
3:50 "options are the right but not obligation to buy or sell"<br /> who on earth is so stupid to take part in such a gamble?<br /> this is just another intelligence test, exploiting the fact that most people are idiots.
-
- Nov 2022
-
www.synacktiv.com www.synacktiv.com
- Nov 2021
-
www.nature.com www.nature.com
-
Jamieson, K. H. (2021). How conspiracists exploited COVID-19 science. Nature Human Behaviour, 1–2. https://doi.org/10.1038/s41562-021-01217-2
-
-
twitter.com twitter.com
-
Nature Portfolio on Twitter. (n.d.). Twitter. Retrieved 3 November 2021, from https://twitter.com/NaturePortfolio/status/1455668301284130820
-
- Oct 2020
-
docs.gitlab.com docs.gitlab.com
-
Here is a simplified example of a malicious .gitlab-ci.yml
-
-
reisub0.github.io reisub0.github.io
-
Most people seem to follow one of two strategies - and these strategies come under the umbrella of tree-traversal algorithms in computer science.
Deciding whether you want to go deep into one topic, or explore more topics, can be seen as a choice between two types of tree-traversal algorithms: depth-first and breadth-first.
This also reminds me of the Explore-Exploit problem in machine learning, which I believe is related to the Multi-Armed Bandit Problem.
-
- May 2020
-
notes.andymatuschak.org notes.andymatuschak.org
-
WhyGeneral infrastructure simply takes time to build. You have to carefully design interfaces, write documentation and tests, and make sure that your systems will handle load. All of that is rival with experimentation, and not just because it takes time to build: it also makes the system much more rigid.Once you have lots of users with lots of use cases, it’s more difficult to change anything or to pursue radical experiments. You’ve got to make sure you don’t break things for people or else carefully communicate and manage change.Those same varied users simply consume a great deal of time day-to-day: a fault which occurs for 1% of people will present no real problem in a small prototype, but it’ll be high-priority when you have 100k users.Once this playbook becomes the primary goal, your incentives change: your goal will naturally become making the graphs go up, rather than answering fundamental questions about your system.
The reason the conceptual architecture tends to freeze is because there is a tradeoff between a large user base and the ability to run radical experiments. If you've got a lot of users, there will always be a critical mass of complaints when the experiment blows up.
Secondly, it takes a lot of time to scale up. This is time that you cannot spend experimenting.
Andy here is basically advocating remaining in Explore mode a little bit longer than is usually recommended. Doing so will increase your chances of climbing the highest peak during the Exploit mode.
-
- Apr 2019
-
palant.de palant.de
-
Oops, I think that one might even be exploitable… I think I’m going to stop here. This needs a structured effort, not spending ten minutes every now and then. As I said, the codebase isn’t bad. But there are obvious issues that shouldn’t have been there. As always, spotting the issues is the easy part – proving that they are exploitable is far harder. I’m not going to spend time on that right now, so let’s just file these under “minor quality issues” rather than “security problems.”
-