• 3 Posts
  • 8 Comments
Joined 4 months ago
cake
Cake day: August 4th, 2024

help-circle
  • I am a Patreon supporter of Jim Browning. Incidentally, I got this email today:

    At last, I can reveal something I’ve been working on in conjunction with a major UK cellphone operator, O2. Meet dAIsy. Daisy is an AI bot who answers scam phone calls. Thanks to the mobile operator who can fingerprint scam phone calls via the calling pattern, source, sequence of calls and other markers, scam calls are being diverted to an AI bot who has been trained to keep the scammers on the phone as long as possible.

    This is my recording of a Zoom interview I had today with Channel 5 news in the UK where you can see dAIsy in action.

    I will continue to train dAIsy with real scam phone calls. When we perfect her, the aim is to work with other cell and landline operators to divert scam calls to thousands of instances of dAIsy. […]

    So you’re not wrong about this being a project of some anti-scam YouTuber, you just guessed the wrong one. ^^



  • Copying my reply from another thread:

    This link should be working.

    Quoting from the OP tweet:

    * Unauthenticated RCE vs all GNU/Linux systems (plus others) disclosed 3 weeks ago.
    * Full disclosure happening in less than 2 weeks (as agreed with devs).
    * Still no CVE assigned (there should be at least 3, possibly 4, ideally 6).
    * Still no working fix.
    * Canonical, RedHat and others have confirmed the severity, a 9.9, check screenshot.
    * Devs are still arguing about whether or not some of the issues have a security impact.

    I’ve spent the last 3 weeks of my sabbatical working full time on this research, reporting, coordination and so on with the sole purpose of helping and pretty much only got patronized because the devs just can’t accept that their code is crap - responsible disclosure: no more.


  • This link should be working.

    Quoting from the OP tweet:

    * Unauthenticated RCE vs all GNU/Linux systems (plus others) disclosed 3 weeks ago.
    * Full disclosure happening in less than 2 weeks (as agreed with devs).
    * Still no CVE assigned (there should be at least 3, possibly 4, ideally 6).
    * Still no working fix.
    * Canonical, RedHat and others have confirmed the severity, a 9.9, check screenshot.
    * Devs are still arguing about whether or not some of the issues have a security impact.

    I’ve spent the last 3 weeks of my sabbatical working full time on this research, reporting, coordination and so on with the sole purpose of helping and pretty much only got patronized because the devs just can’t accept that their code is crap - responsible disclosure: no more.