• Agent641
      link
      fedilink
      arrow-up
      115
      ·
      3 months ago

      For one brief, terrifying moment, the source code of my life’s work existed only in Groks memory.

    • MagnyusG
      link
      fedilink
      arrow-up
      28
      ·
      3 months ago

      not even masking that they just want to steal you to give them all your code.

    • athairmor
      link
      fedilink
      arrow-up
      14
      ·
      3 months ago

      Obviously, because you need to empty your “source code file” to make room for Grok’s corrected code.

    • Goun@lemmy.ml
      link
      fedilink
      arrow-up
      9
      ·
      3 months ago

      Dude, copying source code files is most probably against the NDA

    • LifeInMultipleChoice
      link
      fedilink
      arrow-up
      8
      ·
      3 months ago

      This is the guy who doesn’t own a laptop remember… he may not know the difference, or maybe his lawyer was lying.

        • LifeInMultipleChoice
          link
          fedilink
          arrow-up
          3
          ·
          3 months ago

          A letter his lawyers sent in his defense.

          “Plaintiffs sent Defendants a letter informing them that Plaintiffs were conducting searches of Mr. Musk’s mobile phone, having searched his emails, and that Mr. Musk does not use a computer,” the filing reads.

      • bus_factor
        link
        fedilink
        arrow-up
        3
        ·
        3 months ago

        I was wide-eyed at this, and then I realized that I don’t own a laptop either! I have owned a few, but after my last one died 5+ years ago I’ve just been using my 10 year old desktop computer which doubles as a home server. I do have a work laptop, but I don’t own it.

        • LifeInMultipleChoice
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          3 months ago

          We’ll to be fair they said he doesn’t use a computer. So both your old desktop and your work computer I would count as computers you used. I should have worded it more accurately

    • TheTechnician27
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      edit-2
      3 months ago

      Theoretically, cutting and pasting a file into your browser will just act like copy–pasting, but that’s still a dumb way to phrase it.

      • JPAKx4@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        18
        ·
        3 months ago

        That is the correct way of thinking, never trust anything with your passwords.

        I was curious on what haveibeenpwned does, so I took a look at what the network tab in dev tools said what was actually sent. When I type a password (say password123) and press check it runs a function that hashes with the “SHA-1” hash function and then sends the first 5 characters of the result. The response is over a thousand lines in the format of 35 hash characters:number of breaches

        If any of these hashes are the start of your original hash, you now know it’s exposed and how many times it’s been exposed.

      • kautau
        link
        fedilink
        arrow-up
        16
        ·
        edit-2
        3 months ago

        Except you’re not

        https://haveibeenpwned.com/API/v3#PwnedPasswords

        Your computer is basically sending a part of your password (the first five characters of a hash) and if the server responds positively to a match it sends all the other possible combinations and your computer looks to see if it matches the rest based on when you typed.

        For more information

        https://en.wikipedia.org/wiki/K-anonymity

        It’s always good to be cautious, but it’s especially important to know how tech works, especially good tech, when it can have immense benefit

      • we are all@crazypeople.online
        link
        fedilink
        arrow-up
        3
        arrow-down
        1
        ·
        3 months ago

        I wouldn’t recommend providing any current passwords, but it could be used to determine any recent/previous compromises.

    • Kirp123
      link
      fedilink
      arrow-up
      28
      ·
      3 months ago

      Hey man how is poor Elon going to make money if people don’t give him free shit? Just think of the billionaires.

  • Treczoks
    link
    fedilink
    arrow-up
    35
    ·
    3 months ago

    Anyone working in software development should be aware that the employment contract most probably contains a non-disclosure clause that forbids to hand business secrets like source code to outsiders, or worse, competitors.

    • Goun@lemmy.ml
      link
      fedilink
      arrow-up
      15
      ·
      3 months ago

      In my company they see OpenAI ond others the same way they see Github or Atlassian, so I think this line is getting a bit blurrier

  • Rob T Firefly
    link
    fedilink
    English
    arrow-up
    24
    ·
    3 months ago

    “Will you walk into my parlour?” said a spider to a fly…

    • Ech@lemmy.ca
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      3 months ago

      I keep seeing claims that grok is a “mechanical Turk”, but searching turns up nothing. What evidence is there of this?

      • Ulrich@feddit.org
        link
        fedilink
        English
        arrow-up
        7
        ·
        3 months ago

        I think it’s just a joke, as we’ve seen many AI projects are just Indians.

      • Zagorath@aussie.zone
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        3 months ago

        Yeah it seems pretty unlikely that any AI chat bots are manipulating code in the complex (whether the output is correct or not is immaterial to the complexity of the changes being made) ways that they are that quickly despite actually being done by humans.

          • Unpigged@lemmy.dbzer0.com
            link
            fedilink
            arrow-up
            2
            arrow-down
            1
            ·
            3 months ago

            Oh. Funny, I use the term as a metaphor for a mechanical system that’s entertaining but not really useful.

            • Ech@lemmy.ca
              link
              fedilink
              arrow-up
              1
              ·
              3 months ago

              Ah, ok. That’s not really what it means, but I see what you meant.

  • Mio@feddit.nu
    link
    fedilink
    arrow-up
    5
    ·
    3 months ago

    Now, take the code for AI and paste that in. It does not work? Then AI is no good.