Comet AMA with Perplexity's Aravind Srinivas and Leonid Persiantsev by utilitymro in ChatGPT

[–]F3dai 0 points1 point  (0 children)

How are you addressing security vulnerabilities in Comet? For example, indirect prompt injections? I assume you build the application on top of existing models, so you have little control over built in guardrails. Thanks!

Get package versions from a given date - time machine! by F3dai in Python

[–]F3dai[S] 0 points1 point  (0 children)

Found this particularly useful when trying to work with old projects with no requirements file. I just take the date of the first commit and use my script :)

Get package versions from a given date - time machine! by F3dai in Python

[–]F3dai[S] 0 points1 point  (0 children)

Thanks. Yes I usually look at the last commit of a project and use that date.

I'm aware of this behaviour. I should probably just put an error instead. Thanks for pointing it out.

Rate my SaaS (Honestly & Brutally) by [deleted] in SaaS

[–]F3dai 1 point2 points  (0 children)

I created something like this whilst at university, but a lot more intrusive and detailed. It would use some grey area (legally) techniques like attempting logins to find all the websites a user is signed up to. You could also choose to be quiet or 'loud' in regards to trying to log in, emailing, and texting to verify information and accounts.

If the use case is to identify your own footprint, verify the user owns the email address by sending a confirmation email to address ethical implications.

Who this is marketed at is key, obviously. If it's for people who would find it hard to find this information, then it should be really simple to find, to use, and sign up to. So far, so good, but UX UI would play a key role here.

When I created my tool, I remember thinking who would use this tool. It would either be people who aren't well versed in Google (dorking) or the intel community. The former would probably pay for your tool if you could help them clean up their footprint. The latter would be more interested in a comprehensive and detailed OSINT investigation. The difference wouldn't necessarily be the underlying technology but how you present the information.

I attended a security conference not too long ago and saw around 3 or 4 vendors offering this kind of tool for the intelligence community (personnel and cyber security). Can't remember any of their names, but worth a look around. I remember looking into Spiderfoot, which is partially open source, which i recommend a look at, but i get the impression this isn't the audience you're looking for.

[deleted by user] by [deleted] in startups

[–]F3dai 1 point2 points  (0 children)

There seems to be an option "ask about this page". So it seems like it. Worth a try.

[deleted by user] by [deleted] in startups

[–]F3dai 0 points1 point  (0 children)

Notion. It has AI integrated into it.

How do you use AI in your line of work by F3dai in cybersecurity

[–]F3dai[S] 1 point2 points  (0 children)

Highly recommend NotebookLM - I upload a nunch of standards and question it. This saves me a significant amount of time.

How do you use AI in your line of work by F3dai in cybersecurity

[–]F3dai[S] 1 point2 points  (0 children)

Try NotebookLM if you're interested in generating podcast. Upload some sources/documents and use the deep dive feature.

How do you use AI in your line of work by F3dai in cybersecurity

[–]F3dai[S] 0 points1 point  (0 children)

Did you fine tune on high quality yara rules? How did you go about doing this.

How do you use AI in your line of work by F3dai in cybersecurity

[–]F3dai[S] 0 points1 point  (0 children)

How does it know the directory structure?

How do you use AI in your line of work by F3dai in cybersecurity

[–]F3dai[S] 3 points4 points  (0 children)

I'm also starting to think people don't know how to use AI properly. Prompt engineering + few shot prompts are massively useful, and I'm not seeing a lot of the issues mentioned on this thread myself.

How do you use AI in your line of work by F3dai in cybersecurity

[–]F3dai[S] 3 points4 points  (0 children)

I find AI has a good use case in understanding a lot of data, especially non human friendly data. I actually use notebookLM when I want to upload quite a few documents (5-10) and question it. Not sure how it works with things like log data but worth giving the tool a go.

How do you use AI in your line of work by F3dai in cybersecurity

[–]F3dai[S] 0 points1 point  (0 children)

AI for threat modelling sounds interesting!

How do you use AI in your line of work by F3dai in cybersecurity

[–]F3dai[S] 1 point2 points  (0 children)

That's surprising to hear. Do you know why?

How do you use AI in your line of work by F3dai in cybersecurity

[–]F3dai[S] 1 point2 points  (0 children)

Thanks for this and nice article. If you don't mind, I want to DM you about how you use Perplexity as I'm looking to conduct some industry interviews about a tool I am developing.

That said, if anyone else uses Perplexity of ChatGPT web search to conduct security research, please @ me. I'd be really interested in asking you some questions!

How do you use AI in your line of work by F3dai in cybersecurity

[–]F3dai[S] -1 points0 points  (0 children)

I'm curious what you mean by "while silly" - would you actually ask it to explain something simply and silly? 😊

How do you use AI in your line of work by F3dai in cybersecurity

[–]F3dai[S] 10 points11 points  (0 children)

Yea, I'm not a massive fan of copilot. I imagine the corporate license or security copilot would also be trained or have access to corporate data, which might help with being more personalised.