this post was submitted on 12 Apr 2026
8 points (100.0% liked)

Technology

84043 readers
8511 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 13 comments
sorted by: hot top controversial new old
[–] veeesix@lemmy.ca 1 points 1 week ago

How kind of the government to provide these tools to ordinary citizens.

[–] EndOfLine@lemmy.world 1 points 1 week ago (1 children)

Is it just me or do the logos for those companies look like drawings of anuses?

[–] uberdroog@lemmy.world 1 points 1 week ago

Is that the Vonnegut butthole?

[–] null@lemmy.org 0 points 1 week ago (1 children)

This automated system analyzed information across 305 internal servers, rapidly producing 2,597 structured intelligence reports. By automating the data analysis phase, a single operator successfully processed an intelligence volume that would traditionally require an entire team.

That's a great ad, not gonna lie.

[–] Jakeroxs@sh.itjust.works 0 points 1 week ago (3 children)

But everyone on Lemmy said LLMs had no usecases

[–] redsand@infosec.pub 0 points 1 week ago (1 children)

They have lots of use cases for red team. Recon, enumeration, exploit chaining, fuzzing. It doesn't matter if the error rate is 10-20% a shell is a shell

[–] anarchiddy@lemmy.dbzer0.com 0 points 1 week ago (1 children)

I imagine it has plenty of use cases for blue team as well, just not as many for active threat response.

[–] redsand@infosec.pub 1 points 1 week ago* (last edited 1 week ago)

It can help you write the patch. Identify threats in a SIEM or SOAR setup. But I can't think of much else. Defense has to be correct. If your .htaccess file is 99% correct that's a problem

[–] chunes@lemmy.world 0 points 1 week ago (1 children)

you're seeing massive cope because most of lemmy is tech workers

[–] CheeseNoodle@lemmy.world 2 points 1 week ago

3D artist here, generative AI models are great at making work that looks super impressive while being completely unuseable for most applications, I suspect this is what most tech workers find too.

[–] cowboykermit@sh.itjust.works 0 points 1 week ago* (last edited 1 week ago) (1 children)

Can see a few people disagree with you

Does anyone have a good litmus test for when the perspective might shift? TurboQuant making it easier to have larger context windows for local models give me a pinch of hope and I'm really holding out for a decent Open-Weights model I can self host for Home Automation.

I'm fully aware LLMs are just predictive text on roids and we haven't achieved real AGI, but do we know of anything that will help us filter through the marketing?

[–] GamingChairModel@lemmy.world 1 points 1 week ago

You can reason from a few principles:

  • At its core, the math functions being optimized by these AI tools and their specialized hardware is that they can perform inference and pattern recognition at huge scales across enormous data sets.
  • Inferring a rule set for pattern also allows generation of new data that fits that pattern.
  • Some portion of human cognitive work falls within the general framework of finding patterns or finding new data that fits an old pattern.

So when people start making claims about things with clear, objective definitions (a win condition in chess, the fastest route to take through a maze, a highest lossless compression algorithm for real world text), it's reasonable to believe that the current AI infrastructure can lead to breakthroughs on that front. So image recognition, voice recognition, and things like that were largely solved a decade ago. Text generation with clear and simple definitions of good or bad (simple summaries, basic code that accomplishes a clearly defined goal) is what LLMs have been doing well.

On things that have much more fuzzy or even internally inconsistent definitions, the AI world gets much more controversial.

But I happen to believe that finding and exploiting bugs or security vulnerabilities falls more into the well defined problem with well defined successes and failures. So I take it seriously when people claim that AI tools are helpful for developing certain exploits.