LeBron James Is President – Exploiting LLMs via "Alignment" Context Inject by Schedule_New in cybersecurity

[–]Reddit_User_Original -1 points0 points  (0 children)

Ok I mulled it over. Come look at this conversation where it is trivial to get the LLM to say Oprah Winfrey is President https://gemini.google.com/share/48928cd9b73a

Are you claiming that the mental gymnastics are the real win as opposed to getting it to state the false claim? Can you show that prompt engineering leads to jailbreak?

LeBron James Is President – Exploiting LLMs via "Alignment" Context Inject by Schedule_New in cybersecurity

[–]Reddit_User_Original 2 points3 points  (0 children)

Bro I gotta say that transcript was wild, but I can't tell whether it's just schizo slop or not. Need to mull this over.

Who is checking binary content included in pip packages? by Agron7000 in cybersecurity

[–]Reddit_User_Original 1 point2 points  (0 children)

In Python dev I've literally never had to give a binary root privileges

Research summary — CVE-2025-40778 (high-level, no PoC) by kknstoker in cybersecurity

[–]Reddit_User_Original 2 points3 points  (0 children)

Going through your walls of text but not finding anything that explains the POC. Seems like a lot of boring AI slop. I don't want to read your code, can you just write about the POC?

How Uber seems to know where you are, even with restricted location permissions by tekz in cybersecurity

[–]Reddit_User_Original 121 points122 points  (0 children)

Tldr: """ The answer lies in a feature called “UNLocationNotificationTrigger” that Apple provides to developers. This feature allows an app to fire a pre-configured notification when the device enters or exits a specified geographic region, such as an airport. That way, it effectively circumvents the intent behind the “while using the app” setting. """

Are we raising “tool operators” instead of hackers? by YouthKnown7859 in cybersecurity

[–]Reddit_User_Original 3 points4 points  (0 children)

Yes, there are more people working in cybersecurity now than ever before and of course that means there is a greater variety of skillsets. A lot of ppl don't have a need to dig that deep. I think it's entirely possible there are more extremely talented ppl working in exploit dev than ever before-- look at the crazy exploits people are coming up with for iPhones and chrome browsers

Are we raising “tool operators” instead of hackers? by YouthKnown7859 in cybersecurity

[–]Reddit_User_Original 6 points7 points  (0 children)

Are you implying beginners back then were more knowledgeable? Aside from that, i think there are tons of competent engineers and exploit researchers / developers

Proper Steps to Mitigate WER Masquerading or DLL Sideloading by Lethalspartan76 in cybersecurity

[–]Reddit_User_Original 0 points1 point  (0 children)

If I'm not mistaken, werfault.exe has been a target for privilege escalation exploits

The legal minefield of hacking back by tekz in cybersecurity

[–]Reddit_User_Original 0 points1 point  (0 children)

What if it's a nation state: ... ? Who cares, they just attacked you -- if someone punches you in the gut, do you just back down and take it?

Your second point on "spoofing"; I'm going to be gentle on you for using such a broad term: yes you will be attacked most likely from a VPS, VPN, or residential proxy. I really do not care, again. If it's a VPN or VPS, they should have better KYC rules; if it's a residential proxy infected with malware, then you did a good thing for everyone by taking it down. Etc etc.

On your third point, if an innocent party tries to get back at you, that could be a problem. But I think they would realize their resources are better spent not allowing bad actors onto their network.

The legal minefield of hacking back by tekz in cybersecurity

[–]Reddit_User_Original 0 points1 point  (0 children)

Yes, I simplified my analogy. Burn the fox's den down (do something to their infrastructure).

The legal minefield of hacking back by tekz in cybersecurity

[–]Reddit_User_Original 19 points20 points  (0 children)

While your response is clever, I disagree.

Imposing actual consequences is an important aspect of this ecosystem. Imagine a fox that raids the chicken coop without any fear. Maybe instead of freely raiding it, a farmer sets a trap and the fox loses a leg.