![Jimmy Shah Profile](https://pbs.twimg.com/profile_images/950045008224071680/DUUruMTZ_x96.jpg)
Jimmy Shah
@shah_jim
Followers
381
Following
19K
Statuses
1K
Lighter than a Bus, has a CPU, and likely targeted? Probably my problem. :) "What could go wrong?" I'm paid to answer and sometimes prove. he/him
Los Angeles
Joined January 2011
@kitten_beloved You've heard of The FuMP? [1] It's difficult for the potential Funny(i.e. parodies, comedy, etc.) Music audience to find other musicians. ______ [1]
0
0
0
@lauriewired So it's hash collisions in the dryer why I sometimes end up with only one sock of a pair? And not the sock elves? Sounds like sock elf propaganda.
0
0
0
@bettersafetynet The safety mechanisms were solely SW/FW controlled? Had the development team ever worked in human-safety critical industries? Co-bots merc'ing people should only be a sci-fi trope and not a cost-saving measure.
1
0
1
@vxunderground @_MG_ @Hak5 "Nah buddy, this is one of those fancy charging cables. It even has wifi."
0
0
0
@AdrianThonig @lauriewired Currently or historically? I get where you're coming from. I only vaguely recall Cyrix and Via, but remember there were a while bunch. Wikipedia is our friend.[1] [1]
1
0
0
@LisaForteUK Violating Asimov's Rules of Robotics(#1 or #3) during interactions with pedestrians. Robots that interact/exist in the same space as people generally are bolted to the floor and have several safety interlocks. Non-A Vehicles have safety interlocks, but they also have bugs.
0
0
2
@lauriewired Do the random notes have some sort of metadata to aid in finding again? Like a header/headline about the particular note? Sometimes I need more context. I find mind maps more useful for chunks of notes. Zettelkasten does sound like make-work, especially on paper.
0
0
0
@typingloudly @sherrod_im You don't need to take the drink if you don't want to. But always take the mic, and repeat all questions asked. So others know what you're responding to.
0
0
0
@lauriewired Time to first LLM worm? Optimized to avoid detection?[1] Network attached compute for botnets? ---------------- [1] End users may not notice, but it's a malware author Best Practice, no?
0
0
0
@vxunderground If they're hired by a defensive product company, part of the job is PR/sales via published research and presentations. And stimulants are not a constant of most response related roles? But agreed, glad they're working. Wish they could share info more widely.
0
0
0
@ImposeCost Arguably the set of SW devs that write the tools threat actors use to extort others have better/any secure coding knowledge("know the rules to breqkthe rules").[1] ------------ [1]
0
0
0