257
"Source code file" (gregtech.eu)
top 46 comments
sorted by: hot top controversial new old
[-] HornedMeatBeast@lemmy.world 112 points 5 days ago

Firstly... no.

Secondly... cut and paste? Not copy?

[-] Agent641@lemmy.world 109 points 5 days ago

For one brief, terrifying moment, the source code of my life's work existed only in Groks memory.

[-] moseschrute@piefed.social 10 points 5 days ago

Happy cake day!

[-] MagnyusG@lemmy.world 27 points 5 days ago

not even masking that they just want ~~to steal~~ you to give them all your code.

[-] athairmor@lemmy.world 14 points 5 days ago

Obviously, because you need to empty your “source code file” to make room for Grok’s corrected code.

[-] rivvvver@lemmy.dbzer0.com 15 points 5 days ago

yes, so u can replace it right away with groks "fixed" version ofc 😊

[-] wheezy@lemmy.ml 17 points 5 days ago

Now with 50% more Hitler!

[-] bhamlin@lemmy.world 3 points 4 days ago

They should do it with grok's source.

[-] paulbg@programming.dev 1 points 3 days ago

would be better if the xAI team just deleted all this shit.

[-] Goun@lemmy.ml 9 points 5 days ago

Dude, copying source code files is most probably against the NDA

This is the guy who doesn't own a laptop remember.. he may not know the difference, or maybe his lawyer was lying.

[-] Goun@lemmy.ml 4 points 5 days ago

A letter his lawyers sent in his defense.

“Plaintiffs sent Defendants a letter informing them that Plaintiffs were conducting searches of Mr. Musk’s mobile phone, having searched his emails, and that Mr. Musk does not use a computer,” the filing reads.

[-] bus_factor@lemmy.world 3 points 5 days ago

I was wide-eyed at this, and then I realized that I don't own a laptop either! I have owned a few, but after my last one died 5+ years ago I've just been using my 10 year old desktop computer which doubles as a home server. I do have a work laptop, but I don't own it.

[-] LifeInMultipleChoice@lemmy.world 2 points 5 days ago* (last edited 5 days ago)

We'll to be fair they said he doesn't use a computer. So both your old desktop and your work computer I would count as computers you used. I should have worded it more accurately

[-] brainwashed@feddit.org 3 points 5 days ago

If you are a true believer you only cut and paste, deploy afterwards without checking.

[-] Kyle_The_G@lemmy.world 4 points 5 days ago
[-] TheTechnician27@lemmy.world 2 points 5 days ago* (last edited 5 days ago)

Theoretically, cutting and pasting a file into your browser will just act like copy–pasting, but that's still a dumb way to phrase it.

[-] crazycraw@crazypeople.online 81 points 5 days ago

this is basically

“see if your credit card has been hacked by entering it below!“

[-] DaTingGoBrrr@lemmy.ml 17 points 5 days ago* (last edited 5 days ago)

I get the same vibes from https://haveibeenpwned.com/Passwords

I know the site is made by a security researcher but still. It doesn't feel completely safe to give then my passwords.

[-] JPAKx4 17 points 5 days ago

That is the correct way of thinking, never trust anything with your passwords.

I was curious on what haveibeenpwned does, so I took a look at what the network tab in dev tools said what was actually sent. When I type a password (say password123) and press check it runs a function that hashes with the "SHA-1" hash function and then sends the first 5 characters of the result. The response is over a thousand lines in the format of 35 hash characters:number of breaches

If any of these hashes are the start of your original hash, you now know it's exposed and how many times it's been exposed.

[-] kautau@lemmy.world 15 points 5 days ago* (last edited 5 days ago)

Except you’re not

https://haveibeenpwned.com/API/v3#PwnedPasswords

Your computer is basically sending a part of your password (the first five characters of a hash) and if the server responds positively to a match it sends all the other possible combinations and your computer looks to see if it matches the rest based on when you typed.

For more information

https://en.wikipedia.org/wiki/K-anonymity

It’s always good to be cautious, but it’s especially important to know how tech works, especially good tech, when it can have immense benefit

[-] crazycraw@crazypeople.online 3 points 5 days ago

I wouldn't recommend providing any current passwords, but it could be used to determine any recent/previous compromises.

yeah let me just give all of my code to elon for free

[-] Kirp123@lemmy.world 26 points 5 days ago

Hey man how is poor Elon going to make money if people don't give him free shit? Just think of the billionaires.

[-] iceonfire1@lemmy.world 41 points 5 days ago

Ah yes, "fix" it for "free"

[-] Treczoks@lemmy.world 32 points 5 days ago

Anyone working in software development should be aware that the employment contract most probably contains a non-disclosure clause that forbids to hand business secrets like source code to outsiders, or worse, competitors.

[-] Goun@lemmy.ml 13 points 5 days ago

In my company they see OpenAI ond others the same way they see Github or Atlassian, so I think this line is getting a bit blurrier

[-] wewbull@feddit.uk 9 points 5 days ago

The line is as sharp as ever. Everybody just ignores it.

[-] onlyhall@aussie.zone 11 points 5 days ago

This just in: Elon is a fraud and has no idea what he's doing. More at 10.

[-] baggachipz@sh.itjust.works 21 points 5 days ago
[-] fartographer@lemmy.world 8 points 5 days ago

H3 1z d4 1 =o

[-] rob_t_firefly@lemmy.world 21 points 5 days ago

"Will you walk into my parlour?" said a spider to a fly...

[-] Unpigged@lemmy.dbzer0.com 13 points 5 days ago

Set aside the cut n paste, what exactly would the Grokanical Türk "fix"?

[-] emerald 20 points 5 days ago

The comments in your code being too woke

[-] cecilkorik@lemmy.ca 14 points 5 days ago

Error 608: Insufficient Hitler

[-] Unpigged@lemmy.dbzer0.com 1 points 5 days ago

Remove all state machine implementations because they support transitions.

[-] ech@lemmy.ca 6 points 5 days ago* (last edited 5 days ago)

I keep seeing claims that grok is a "mechanical Turk", but searching turns up nothing. What evidence is there of this?

[-] Ulrich@feddit.org 7 points 5 days ago

I think it's just a joke, as we've seen many AI projects are just Indians.

[-] Zagorath@aussie.zone 4 points 5 days ago

Yeah it seems pretty unlikely that any AI chat bots are manipulating code in the complex (whether the output is correct or not is immaterial to the complexity of the changes being made) ways that they are that quickly despite actually being done by humans.

[-] Unpigged@lemmy.dbzer0.com 1 points 5 days ago
[-] ech@lemmy.ca 1 points 5 days ago

Of being a person responding instead of an llm.

[-] Unpigged@lemmy.dbzer0.com 2 points 4 days ago

Oh. Funny, I use the term as a metaphor for a mechanical system that's entertaining but not really useful.

[-] ech@lemmy.ca 1 points 4 days ago

Ah, ok. That's not really what it means, but I see what you meant.

[-] Mio@feddit.nu 5 points 5 days ago

Now, take the code for AI and paste that in. It does not work? Then AI is no good.

[-] zephiriz@lemmy.ml 3 points 5 days ago
this post was submitted on 12 Jul 2025
257 points (100.0% liked)

Fuck AI

3492 readers
406 users here now

"We did it, Patrick! We made a technological breakthrough!"

A place for all those who loathe AI to discuss things, post articles, and ridicule the AI hype. Proud supporter of working people. And proud booer of SXSW 2024.

founded 1 year ago
MODERATORS