this post was submitted on 12 Jul 2025
224 points (100.0% liked)

Fuck AI

3450 readers
1635 users here now

"We did it, Patrick! We made a technological breakthrough!"

A place for all those who loathe AI to discuss things, post articles, and ridicule the AI hype. Proud supporter of working people. And proud booer of SXSW 2024.

founded 1 year ago
MODERATORS
top 47 comments
sorted by: hot top controversial new old
[–] [email protected] 2 points 3 hours ago

This just in: Elon is a fraud and has no idea what he's doing. More at 10.

[–] [email protected] 30 points 17 hours ago (1 children)

Anyone working in software development should be aware that the employment contract most probably contains a non-disclosure clause that forbids to hand business secrets like source code to outsiders, or worse, competitors.

[–] [email protected] 13 points 17 hours ago (1 children)

In my company they see OpenAI ond others the same way they see Github or Atlassian, so I think this line is getting a bit blurrier

[–] [email protected] 5 points 11 hours ago

The line is as sharp as ever. Everybody just ignores it.

[–] [email protected] 68 points 19 hours ago (1 children)

this is basically

“see if your credit card has been hacked by entering it below!“

[–] [email protected] 12 points 18 hours ago* (last edited 18 hours ago) (4 children)

I get the same vibes from https://haveibeenpwned.com/Passwords

I know the site is made by a security researcher but still. It doesn't feel completely safe to give then my passwords.

[–] [email protected] 9 points 15 hours ago* (last edited 9 hours ago)

Except you’re not

https://haveibeenpwned.com/API/v3#PwnedPasswords

Your computer is basically sending a part of your password (the first five characters of a hash) and if the server responds positively to a match it sends all the other possible combinations and your computer looks to see if it matches the rest based on when you typed.

For more information

https://en.wikipedia.org/wiki/K-anonymity

It’s always good to be cautious, but it’s especially important to know how tech works, especially good tech, when it can have immense benefit

[–] [email protected] 14 points 17 hours ago

That is the correct way of thinking, never trust anything with your passwords.

I was curious on what haveibeenpwned does, so I took a look at what the network tab in dev tools said what was actually sent. When I type a password (say password123) and press check it runs a function that hashes with the "SHA-1" hash function and then sends the first 5 characters of the result. The response is over a thousand lines in the format of 35 hash characters:number of breaches

If any of these hashes are the start of your original hash, you now know it's exposed and how many times it's been exposed.

[–] [email protected] 3 points 18 hours ago

While I get your concern. I, and loads of other nerds, trust them.

[–] [email protected] 2 points 17 hours ago

I wouldn't recommend providing any current passwords, but it could be used to determine any recent/previous compromises.

[–] [email protected] 101 points 21 hours ago (9 children)

Firstly... no.

Secondly... cut and paste? Not copy?

[–] [email protected] 3 points 3 hours ago

If you are a true believer you only cut and paste, deploy afterwards without checking.

[–] [email protected] 102 points 21 hours ago (2 children)

For one brief, terrifying moment, the source code of my life's work existed only in Groks memory.

[–] [email protected] 19 points 20 hours ago (1 children)
[–] [email protected] 10 points 17 hours ago* (last edited 17 hours ago) (1 children)
[–] [email protected] 3 points 2 hours ago

hey Agent Smith. what makes you love feet so much?

[–] [email protected] 10 points 21 hours ago

Happy cake day!

[–] [email protected] 12 points 17 hours ago

Obviously, because you need to empty your “source code file” to make room for Grok’s corrected code.

[–] [email protected] 8 points 17 hours ago

Dude, copying source code files is most probably against the NDA

[–] [email protected] 25 points 21 hours ago

not even masking that they just want ~~to steal~~ you to give them all your code.

[–] [email protected] 13 points 21 hours ago (1 children)

yes, so u can replace it right away with groks "fixed" version ofc 😊

[–] [email protected] 12 points 20 hours ago

Now with 50% more Hitler!

[–] [email protected] 7 points 20 hours ago (2 children)

This is the guy who doesn't own a laptop remember.. he may not know the difference, or maybe his lawyer was lying.

[–] [email protected] 3 points 15 hours ago (1 children)

I was wide-eyed at this, and then I realized that I don't own a laptop either! I have owned a few, but after my last one died 5+ years ago I've just been using my 10 year old desktop computer which doubles as a home server. I do have a work laptop, but I don't own it.

[–] [email protected] 2 points 10 hours ago* (last edited 10 hours ago)

We'll to be fair they said he doesn't use a computer. So both your old desktop and your work computer I would count as computers you used. I should have worded it more accurately

[–] [email protected] 2 points 17 hours ago (1 children)
[–] [email protected] 2 points 10 hours ago

A letter his lawyers sent in his defense.

“Plaintiffs sent Defendants a letter informing them that Plaintiffs were conducting searches of Mr. Musk’s mobile phone, having searched his emails, and that Mr. Musk does not use a computer,” the filing reads.

[–] [email protected] 4 points 21 hours ago
[–] [email protected] 2 points 19 hours ago* (last edited 19 hours ago)

Theoretically, cutting and pasting a file into your browser will just act like copy–pasting, but that's still a dumb way to phrase it.

[–] [email protected] 67 points 21 hours ago (1 children)

yeah let me just give all of my code to elon for free

[–] [email protected] 27 points 21 hours ago

Hey man how is poor Elon going to make money if people don't give him free shit? Just think of the billionaires.

[–] [email protected] 4 points 12 hours ago (1 children)

Now, take the code for AI and paste that in. It does not work? Then AI is no good.

[–] [email protected] 3 points 12 hours ago
[–] [email protected] 42 points 21 hours ago

Ah yes, "fix" it for "free"

[–] [email protected] 19 points 21 hours ago (1 children)
[–] [email protected] 8 points 20 hours ago

H3 1z d4 1 =o

[–] [email protected] 21 points 21 hours ago

"Will you walk into my parlour?" said a spider to a fly...

[–] [email protected] 6 points 17 hours ago

"Cut & paste" and not "copy and paste" because if you cut it, you won't have a copy of it anymore and your code is now Grok's code.

[–] [email protected] 11 points 21 hours ago (2 children)

Set aside the cut n paste, what exactly would the Grokanical Türk "fix"?

[–] [email protected] 18 points 20 hours ago (2 children)

The comments in your code being too woke

[–] [email protected] 13 points 20 hours ago

Error 608: Insufficient Hitler

[–] [email protected] 1 points 13 hours ago

Remove all state machine implementations because they support transitions.

[–] [email protected] 6 points 20 hours ago* (last edited 20 hours ago) (3 children)

I keep seeing claims that grok is a "mechanical Turk", but searching turns up nothing. What evidence is there of this?

[–] [email protected] 6 points 18 hours ago

I think it's just a joke, as we've seen many AI projects are just Indians.

[–] [email protected] 1 points 13 hours ago (1 children)
[–] [email protected] 1 points 13 hours ago

Of being a person responding instead of an llm.

[–] [email protected] 4 points 20 hours ago

Yeah it seems pretty unlikely that any AI chat bots are manipulating code in the complex (whether the output is correct or not is immaterial to the complexity of the changes being made) ways that they are that quickly despite actually being done by humans.