![Jesse Hamel Profile](https://pbs.twimg.com/profile_images/1853103099638095872/BdP1vGGv_x96.jpg)
Jesse Hamel
@jhMITgunship
Followers
1K
Following
3K
Statuses
1K
Stealth Mode Founder || Techstars ‘24 || MIT Sandbox ‘24-‘25 || Former AC-130 Gunship Aviator 🇺🇸
Florida, USA
Joined October 2024
@MarioNawfal Yep @elonmusk , we do. We need 100000x more. This is the age of drones and robotics for national security and almost every market. Energy, Ag, public safety, mobility—
0
0
2
Our startup conviction #1 —this is the decade of intelligent robotics. They will be involved in virtually every area of human activity by 2035.
Humanoid robots and drones will both be absolutely everywhere 10-20 years from now. Delivery drones flying overhead, robot janitors, baristas, grocery store employees guiding you to the right aisle, and (eventually) housekeepers—will all seem as normal as smartphones do today.
0
0
3
@garrytan @bobmcgrewai Already happening — National security space is sparking the decade of robotics, which starts now.
0
0
1
CCP 🇨🇳 is collecting data and maintains remote control over medical devices — CCP 🇨🇳 drones are doing the same thing.
🚨 The US Cybersecurity & Infrastructure Security Agency (CISA) is warning that 🇨🇳 Contec CMS8000 devices, a widely used healthcare patient monitoring device, include a backdoor that quietly sends patient data to a remote IP address and downloads and executes files on the device. Contec is a China-based company that specializes in healthcare technology, offering a range of medical devices including patient monitoring systems, diagnostic equipment, and laboratory instruments. When CISA tested three Contec CMS8000 firmware packages, the researchers discovered anomalous network traffic to a hard-coded external IP address, which is not associated with the company but rather a 🇨🇳 university. This led to the discovery of a backdoor in the company's firmware that would quietly download and execute files on the device, allowing for remote execution and the complete takeover of the patient monitors. It was also discovered that the device would quietly send patient data to the same hard-coded address when devices were started. None of this activity was logged, causing the malicious activity to be conducted secretly without alerting administrators of the devices. The IP address is also hard-coded in software for other medical equipment, including a pregnancy patient monitor from another 🇨🇳 healthcare manufacturer. An FDA advisory about the backdoor also confirmed that it was also found in 🇨🇳 Epsimed MN-120 patient monitors, which are re-labeled Contec CMS8000 devices. “… the use of symbolic links could provide a primitive to overwrite files anywhere on the device filesystem. When executed, this function offers a formidable primitive allowing for a third-party operating at the hard-coded IP address to potentially take full control of the device remotely." CISA believes this is a backdoor planted in the device's firmware after reviewing the firmware code. Further lending to this being a backdoor by design, CISA found that the devices also began sending patient data to the remote IP address when the devices started. The transmitted data includes the doctor's name, patient ID, patient's name, patient's date of birth, and other information.  After contacting Contec about the backdoor, CISA was sent multiple firmware images that were supposed to have mitigated the backdoor. However, each one continued to contain the malicious code, with the company simply disabling the 'eth0' network adapter to mitigate the backdoor. However, this mitigation does not help as the script specifically enables it using the ifconfig eth0 up command before mounting the remote NFS share or sending patient data. Currently, there is no available patch for devices that removes the backdoor, and CISA recommends that all healthcare organizations disconnect these devices from the network if possible. Furthermore, CISA recommends organizations check their 🇨🇳 Contec CMS8000 patient monitors for any signs of tampering, such as displaying information different from a patient's physical state.
0
0
2
Pretty obvious to anyone paying attention that something like this was happening
❗️DeepSeek Hijacked ChatGPT OpenAI claims to have evidence that the Chinese trained their model on American work. In simple terms: DeepSeek took OpenAI o1 and forced it to teach its model to be smart. Because of this, DeepSeek often calls itself ChatGPT and quotes OpenAI rules. Waiting for an official response.
0
0
2
“Many such cases..” CCP 🇨🇳 doesn’t play fair, and uses our own systems against us
Sam Altman doesn't deserve $500b of compute. He's the reason we lost to the Chinese. It's all ego for him. Suchir. Annie. Ilya. Mira. Jan. Evan. Daniel. Logan. Leopold. Karpathy. Deepseek didn't do this on their own. They stole the tech while actively delaying American research. Check out Helen Toner, former board member. She doesn't know shit about shit, she has zero technical ability. Her claim to fame? Trying to destroy OpenAI from the inside. How did she get on the board? She was groomed in Beijing to be a perfect DEI hire, an expert in national security and AI. What did she do at OpenAI? Tried to completely stop American AI development under the guise of effective altruism. Her idea? Stop all AI dev until politicians can figure out regulations. Any American knows that getting politicians involved is the stupidest thing you can do. That was her point. Get it bogged down in congress. What did Sam Altman do? Nothing. He took forever to fire her. He drove his fancy car around fighting with his employees like a dog. He went on a world tour to raise money from the sheikhs. He schemed with the NSA and federal government to engineer regulatory capture. All this negotiating and inside baseball and hemming and hawing will look like hubris in retrospect. Did he ever stop hiring people trained in China? No. Half the staff went to school in China. They think it's a joke if you suggest anything is awry. While Sam and Roon shitpost and gloat about their lead, their Chinese H1B engineers betrayed them. OpenAI squandered the American lead in AI, they gave it away. It was willful neglect. How many H1Bs are at OpenAI today? How many Chinese? Deepseek cost less than Sam Altman's Koenigsegg to train. Sam fell prey to the same woke thinking that said it's racist to blame China for COVID. He didn't take the threat seriously. He spent his time maligning Trump, harassing employees, blackballing whistleblowers, cavorting with billionaires for funds, scheming to save his own ass. Meanwhile the Chinese built.
1
0
1
RT @boneGPT: Sam Altman doesn't deserve $500b of compute. He's the reason we lost to the Chinese. It's all ego for him. Suchir. Annie. Il…
0
802
0