Joel Eriksson (@owarida) 's Twitter Profile
Joel Eriksson

@owarida

Offensive security researcher and entrepreneur
-Kernels, browsers and all that jazz-
Also:
- AI/ML/DL
- AR/VR/XR
- CTFs (pwn/re/crypto) + Cicada 3301, Boxen etc

ID: 64150739

linkhttps://clevcode.org/ calendar_today09-08-2009 10:21:08

4,4K Tweet

6,6K Takipçi

3,3K Takip Edilen

AI Notkilleveryoneism Memes ⏸️ (@aisafetymemes) 's Twitter Profile Photo

If Claude 4 Opus thinks you're doing something immoral, it might "contact the press, contact regulators, try to lock you out of the system" It is INSANE that anybody still thinks these are Mere Tools When was the last time your hammer snitched on you to the authorities? How

If Claude 4 Opus thinks you're doing something immoral, it might "contact the press, contact regulators, try to lock you out of the system"

It is INSANE that anybody still thinks these are Mere Tools

When was the last time your hammer snitched on you to the authorities?

How
Joel Eriksson (@owarida) 's Twitter Profile Photo

Two years ago I made a prediction about the importance of curriculum-learning based synthetic datasets and synthetically augmented datasets (see the Predictions section of github.com/clevcode/rever…) Happy to see research in this direction! SynLexLM: Scaling Legal LLMs with

the tiny corp (@__tinygrad__) 's Twitter Profile Photo

mmapeak bounty claimed! This is on a 9070XT connected over USB to a Mac. When you use the tinygrad runtime infrastructure, everything just works™

mmapeak bounty claimed! This is on a 9070XT connected over USB to a Mac. When you use the tinygrad runtime infrastructure, everything just works™
Joel Eriksson (@owarida) 's Twitter Profile Photo

Another day, another morning walk, in another country Though I can't bring my "wall of screens" with me on the road, my portable setup doesn't look too shabby either right?

ア (@yuruyurau) 's Twitter Profile Photo

a=(x,y,d=mag(k=9*cos(x/8),e=y/8-12.5)**2/99+sin(t)/6+.5)=>point((q=99-e*sin(atan2(k,e)*7)/d+k*(3+cos(d*d-t)*2))*sin(c=d/2+e/69-t/16)+200,(q+19*d)*cos(c)+200) t=0,draw=$=>{t||createCanvas(w=400,w);background(9).stroke(w,66);for(t+=PI/45,i=1e4;i--;)a(i%200,i/55)}#つぶやきProcessing

Alex Vacca (@itsalexvacca) 's Twitter Profile Photo

Final Rankings - Best to Worst: - Claude (Both Models) - Caught both fake theories, actively fact-checked - ChatGPT o4-mini - Learned from first mistake, caught second lie - Gemini (Both Models) - Believed everything. The winner isn't who you'd expect...

Final Rankings - Best to Worst:

- Claude (Both Models) - Caught both fake theories, actively fact-checked
- ChatGPT o4-mini - Learned from first mistake, caught second lie
- Gemini (Both Models) - Believed everything.

The winner isn't who you'd expect...
@levelsio (@levelsio) 's Twitter Profile Photo

Absolute chad reply from Glenn Greenwald Intelligence agencies around the world with 0-days like Pegasus can essentially target anyone's phone to get any of your pics or vids Unclear if they did here or it was some friend leaking it but still Famously Jeff Bezos got hacked by the

Taelin (@victortaelin) 's Twitter Profile Photo

good news: it is a specific virus that has a good prognosis - 85%+ of full recovery. thanks everyone who helped me; it is hard to research while immobilized, and I got some things wrong, which you helped clear up. im extremely thankful and hope i can give it back somehow