
TomNomNom answers questions for 4 hours straight

Source link
Related Articles
All Mix →How To Find Broken Access Control Vulnerabilities in the Wild
Table of Contents What Is Broken Access Control? BAC Example 1: An e-commerce website allows unauthorized viewing of customer details BAC Example 2: A bank…
vim + llm = 🔥
Table of Contents Leveraging vim’s Visual Mode Applying llm to this feature Caveats Peace If you don’t use vi/vim, you might not find this post…
Why Atheists Should Consider Discussing Religion With Their Moderately Religious Friends
This is an absolutely amazing post on perhaps the most important issue facing atheists today: how to deal with religious moderates (especially friends). You care…
Ambassador Spotlight AWC Edition: Blaklis
Table of Contents What is your role as an ambassador? 🌎 How often do you meet up as a team, and do you have a…
Stop Judging AI Using Standards You Don’t Apply to Humans
Table of Contents Other examples Other examples OTHER EXAMPLES The same errors, different judgments I know AI is stupid because it can’t count the b’s…
How I Learned Integrity: A “Don’t Tase Me, Bro” Lesson
The UF Tasing incident reminded me of something that happened to me in high school. When I was in 9th grade I was almost killed…