this post was submitted on 12 Jul 2025
256 points (96.0% liked)

Fuck AI

3543 readers
408 users here now

"We did it, Patrick! We made a technological breakthrough!"

A place for all those who loathe AI to discuss things, post articles, and ridicule the AI hype. Proud supporter of working people. And proud booer of SXSW 2024.

founded 1 year ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] HornedMeatBeast@lemmy.world 115 points 2 weeks ago (11 children)

Firstly... no.

Secondly... cut and paste? Not copy?

[–] Agent641@lemmy.world 113 points 2 weeks ago (2 children)

For one brief, terrifying moment, the source code of my life's work existed only in Groks memory.

[–] henfredemars@infosec.pub 24 points 2 weeks ago (1 children)
[–] kautau@lemmy.world 13 points 2 weeks ago* (last edited 2 weeks ago) (1 children)
[–] GreenKnight23@lemmy.world 3 points 1 week ago

hey Agent Smith. what makes you love feet so much?

[–] moseschrute@piefed.social 9 points 2 weeks ago

Happy cake day!

[–] MagnyusG@lemmy.world 28 points 2 weeks ago

not even masking that they just want ~~to steal~~ you to give them all your code.

[–] athairmor@lemmy.world 14 points 2 weeks ago

Obviously, because you need to empty your “source code file” to make room for Grok’s corrected code.

[–] rivvvver@lemmy.dbzer0.com 14 points 2 weeks ago (1 children)

yes, so u can replace it right away with groks "fixed" version ofc 😊

[–] wheezy@lemmy.ml 18 points 2 weeks ago

Now with 50% more Hitler!

[–] Goun@lemmy.ml 9 points 2 weeks ago

Dude, copying source code files is most probably against the NDA

[–] LifeInMultipleChoice@lemmy.world 8 points 2 weeks ago (2 children)

This is the guy who doesn't own a laptop remember.. he may not know the difference, or maybe his lawyer was lying.

[–] Goun@lemmy.ml 4 points 2 weeks ago (1 children)

A letter his lawyers sent in his defense.

“Plaintiffs sent Defendants a letter informing them that Plaintiffs were conducting searches of Mr. Musk’s mobile phone, having searched his emails, and that Mr. Musk does not use a computer,” the filing reads.

[–] bus_factor@lemmy.world 3 points 2 weeks ago (1 children)

I was wide-eyed at this, and then I realized that I don't own a laptop either! I have owned a few, but after my last one died 5+ years ago I've just been using my 10 year old desktop computer which doubles as a home server. I do have a work laptop, but I don't own it.

[–] LifeInMultipleChoice@lemmy.world 2 points 2 weeks ago* (last edited 2 weeks ago)

We'll to be fair they said he doesn't use a computer. So both your old desktop and your work computer I would count as computers you used. I should have worded it more accurately

[–] Kyle_The_G@lemmy.world 4 points 2 weeks ago
[–] brainwashed@feddit.org 3 points 1 week ago

If you are a true believer you only cut and paste, deploy afterwards without checking.

[–] bhamlin@lemmy.world 3 points 1 week ago

They should do it with grok's source.

[–] TheTechnician27@lemmy.world 1 points 2 weeks ago* (last edited 2 weeks ago)

Theoretically, cutting and pasting a file into your browser will just act like copy–pasting, but that's still a dumb way to phrase it.

[–] paulbg@programming.dev 1 points 1 week ago

would be better if the xAI team just deleted all this shit.

[–] crazycraw@crazypeople.online 85 points 2 weeks ago (1 children)

this is basically

“see if your credit card has been hacked by entering it below!“

[–] DaTingGoBrrr@lemmy.ml 17 points 2 weeks ago* (last edited 2 weeks ago) (4 children)

I get the same vibes from https://haveibeenpwned.com/Passwords

I know the site is made by a security researcher but still. It doesn't feel completely safe to give then my passwords.

[–] JPAKx4@lemmy.blahaj.zone 18 points 2 weeks ago

That is the correct way of thinking, never trust anything with your passwords.

I was curious on what haveibeenpwned does, so I took a look at what the network tab in dev tools said what was actually sent. When I type a password (say password123) and press check it runs a function that hashes with the "SHA-1" hash function and then sends the first 5 characters of the result. The response is over a thousand lines in the format of 35 hash characters:number of breaches

If any of these hashes are the start of your original hash, you now know it's exposed and how many times it's been exposed.

[–] kautau@lemmy.world 16 points 2 weeks ago* (last edited 2 weeks ago)

Except you’re not

https://haveibeenpwned.com/API/v3#PwnedPasswords

Your computer is basically sending a part of your password (the first five characters of a hash) and if the server responds positively to a match it sends all the other possible combinations and your computer looks to see if it matches the rest based on when you typed.

For more information

https://en.wikipedia.org/wiki/K-anonymity

It’s always good to be cautious, but it’s especially important to know how tech works, especially good tech, when it can have immense benefit

[–] BudgetBandit@sh.itjust.works 3 points 2 weeks ago

While I get your concern. I, and loads of other nerds, trust them.

[–] crazycraw@crazypeople.online 2 points 2 weeks ago

I wouldn't recommend providing any current passwords, but it could be used to determine any recent/previous compromises.

[–] renzhexiangjiao@piefed.blahaj.zone 70 points 2 weeks ago (1 children)

yeah let me just give all of my code to elon for free

[–] Kirp123@lemmy.world 28 points 2 weeks ago

Hey man how is poor Elon going to make money if people don't give him free shit? Just think of the billionaires.

[–] iceonfire1@lemmy.world 44 points 2 weeks ago

Ah yes, "fix" it for "free"

[–] Treczoks@lemmy.world 34 points 2 weeks ago (1 children)

Anyone working in software development should be aware that the employment contract most probably contains a non-disclosure clause that forbids to hand business secrets like source code to outsiders, or worse, competitors.

[–] Goun@lemmy.ml 15 points 2 weeks ago (1 children)

In my company they see OpenAI ond others the same way they see Github or Atlassian, so I think this line is getting a bit blurrier

[–] wewbull@feddit.uk 10 points 2 weeks ago

The line is as sharp as ever. Everybody just ignores it.

[–] rob_t_firefly@lemmy.world 24 points 2 weeks ago

"Will you walk into my parlour?" said a spider to a fly...

[–] baggachipz@sh.itjust.works 22 points 2 weeks ago (1 children)
[–] fartographer@lemmy.world 8 points 2 weeks ago

H3 1z d4 1 =o

[–] Unpigged@lemmy.dbzer0.com 13 points 2 weeks ago (2 children)

Set aside the cut n paste, what exactly would the Grokanical Türk "fix"?

[–] emerald@lemmy.blahaj.zone 19 points 2 weeks ago (2 children)

The comments in your code being too woke

[–] cecilkorik@lemmy.ca 14 points 2 weeks ago

Error 608: Insufficient Hitler

[–] Unpigged@lemmy.dbzer0.com 1 points 2 weeks ago

Remove all state machine implementations because they support transitions.

[–] ech@lemmy.ca 6 points 2 weeks ago* (last edited 2 weeks ago) (3 children)

I keep seeing claims that grok is a "mechanical Turk", but searching turns up nothing. What evidence is there of this?

[–] Ulrich@feddit.org 7 points 2 weeks ago

I think it's just a joke, as we've seen many AI projects are just Indians.

[–] Zagorath@aussie.zone 3 points 2 weeks ago

Yeah it seems pretty unlikely that any AI chat bots are manipulating code in the complex (whether the output is correct or not is immaterial to the complexity of the changes being made) ways that they are that quickly despite actually being done by humans.

[–] Unpigged@lemmy.dbzer0.com 1 points 2 weeks ago (1 children)
[–] ech@lemmy.ca 1 points 2 weeks ago (1 children)

Of being a person responding instead of an llm.

[–] Unpigged@lemmy.dbzer0.com 1 points 1 week ago (1 children)

Oh. Funny, I use the term as a metaphor for a mechanical system that's entertaining but not really useful.

load more comments (1 replies)
[–] onlyhall@aussie.zone 13 points 1 week ago

This just in: Elon is a fraud and has no idea what he's doing. More at 10.

[–] Kolanaki@pawb.social 7 points 2 weeks ago

"Cut & paste" and not "copy and paste" because if you cut it, you won't have a copy of it anymore and your code is now Grok's code.

[–] Mio@feddit.nu 5 points 2 weeks ago (1 children)

Now, take the code for AI and paste that in. It does not work? Then AI is no good.

[–] zephiriz@lemmy.ml 4 points 2 weeks ago
load more comments
view more: next ›