Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

windsheep@infosec.exchangeW

windsheep@infosec.exchange

@windsheep@infosec.exchange
About
Posts
18
Topics
7
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • https://jobs.ashbyhq.com/zeal-network/668e5f58-e8bb-431e-a6b4-531792509654?departmentId=2777b231-5aa8-4fe0-ae2c-758116effeb4
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    Link Preview Image
    (Senior) Cyber Detection & Response Engineer (f/m/d)

    (Senior) Cyber Detection & Response Engineer

    favicon

    (jobs.ashbyhq.com)

    Infosec job in Hamburg / Germany, possibly Berlin, or maybe Madrid if you like.

    Cyber Detection & Response Engineer

    Includes live systems, Kubernetes and Linux. But you can learn that on the job.

    Attitude is key. Learning and empathy.

    Uncategorized

  • https://status.microslop.com/
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    Link Preview Image
    MICROSLOP STATUS — Infrastructure Slop Monitor

    Real-time monitoring of Microsoft infrastructure slop. Track outages, degraded services, and the eternal loading spinner.

    favicon

    (status.microslop.com)

    I once had a case where the mandatory Internet VPN software hadn't been able to connect for months. The respective staff member "didn't notice" that the laptop was offline the entire time.

    Uncategorized

  • Just read that #Mythic is so dangerous, it finds security bugs in code that wasn't seriously audited for years.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    Just read that #Mythic is so dangerous, it finds security bugs in code that wasn't seriously audited for years.

    Terribly impressed.

    Maybe they shouldn't release it and delete it. It's dangerous.

    Uncategorized mythic

  • Linux 7.1 is finally ending support for Intel's 37-year-old 486 processor
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    @nixCraft nooooooo

    Uncategorized

  • My current look on #GitHub messages and emails.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    My current look on #GitHub messages and emails.

    1. is this spam?
    2. is this scam?
    3. is this malware?
    4. is this AI slop?
    5. is this a low effort vuln report?
    6. is this an entitled non-paying user?
    ...

    Under ideal circumstances the messages should be the opposite.

    #microslop #shithub

    Uncategorized github microslop shithub

  • Ich bin heute zum ersten Mal seit Monaten wieder eine längere Strecke Autobahn gefahren.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    @fxdx @der_manu @ulrichkelber Ok, ja. Ich hatte bisher nur einen Fahrer und keinen eigenen Wagen 🙃

    Uncategorized spritpreis

  • Ich bin heute zum ersten Mal seit Monaten wieder eine längere Strecke Autobahn gefahren.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    @der_manu @ulrichkelber Am Feiertag?

    Uncategorized spritpreis

  • NEW: I spoke to cybersecurity legend Mikko Hyppönen about his decades-long fight against computers viruses first, and then malware — and how computers have gotten safer over time.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    @lorenzofb Drones are much more serious than most people assume. They create the sense of human garbage by gamification of war, and erode the sense of the civilian in the war doctrine. They are a game changer on the battlefield but also in politics, because the accountability of remote warfare is lower. The Huthis have drones, so do the Ukrainians. Some with 3d printed components.

    Uncategorized

  • Was sehr interessant ist: BEVs kauft immer noch keine.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    Was sehr interessant ist: BEVs kauft immer noch keine. Egal was passiert. Das liegt nicht an Autos. Das liegt am Wetter 😎

    Uncategorized

  • This thread is golden.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    @erd Of course, that review isn't biased and totally fair.

    The person has read the code in... 16h? Let me check:

    Oh wow.

    * roughly 400k LLOC
    * 1884 files

    /

    16h

    The guy reads 25k LLOC per hour and doesn't sleep. This is Johnny Mnemonic.

    Uncategorized

  • I find the #claudecode source code interesting.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    I don't think this was a marketing gig leak. There is too much IP in there.

    People have no idea how difficult this stuff can be.

    Uncategorized claudecode

  • I find the #claudecode source code interesting.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    There is a semantic firewall against hallucinations.

    Of course... they use an agentic pattern for that.

    Uncategorized claudecode

  • I find the #claudecode source code interesting.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    They use Zod schemas against hallucinations.

    They should write books. This is cool.

    Uncategorized claudecode

  • I find the #claudecode source code interesting.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    Ahh you don't stdin the code base. You segment it into pieces. It reads code, rather than copying it over. The client assumes that it cannot just send over x thousand lines and ask for inference.

    Of course...

    Uncategorized claudecode

  • I find the #claudecode source code interesting.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    Context pruning, minimum complexity, and faithful reporting are key things to consider.

    Alright. That makes total sense.

    Uncategorized claudecode

  • I find the #claudecode source code interesting.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    The "adversarial verifier" is key, imho.

    I see it quite often, and it kicks in for complex challenges. I didn't know you could do that.

    Uncategorized claudecode

  • I find the #claudecode source code interesting.
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    I find the #claudecode source code interesting.

    It's not that different from codex or gemini. Shares many similarities.

    Good job.

    Uncategorized claudecode

  • https://github.com/always-further/nono
    windsheep@infosec.exchangeW windsheep@infosec.exchange

    https://github.com/always-further/nono

    This is a good #sandbox for macOS and Linux #agentic workflows.

    Sadly I need this for Windows more, because both #gemini and #claude have the habit of producing rm -rf / equivalents with find in #PowerShell.

    However, Windows doesn't have the developer community. So it's probably time to drop it. in the enterprise as well.

    Uncategorized sandbox agentic gemini claude powershell
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups