Hacker Newsnew | past | comments | ask | show | jobs | submit | more timdorr's commentslogin

It was a huge surprise that ChatGPT is popular?


The amount of AI generated SEO spam.


How much SEO spam has chatGPT refusing to do things in it though?


Are they?

   London - 8.8m - https://en.wikipedia.org/wiki/London
   Birmingham - 1.1m - https://en.wikipedia.org/wiki/Birmingham
   Manchester - 552k (2.7m urban region) - https://en.wikipedia.org/wiki/Manchester
   Glasgow - 632k (1m in the urban region) - https://en.wikipedia.org/wiki/Glasgow
They're not strictly accurate, but are reasonably close. Also, those Wikipedia numbers are from 2021.


You don't have to keep your hands on the yoke during hard turns with the FSD beta. Even with a wheel, it would be hard to signal the right amount of pressure without disengaging when their is a lot of movement going on.


Yeah but with the wheel you can grip it loosely and let it slide through your fingers whenever you want. With the yoke you'll be forced to constantly let go and grab it again to silence the nagging.



Intel's AMX specifically hasn't yet shipped, but will be coming with their new Sapphire Rapids Xeon chips this year.


*Next year (potentially).

Sapphire rapids might well end up only shipping in Aurora and then being replaced immediately by it's successor.


I suppose we can find a consultant for that in this thread.



It's in the commit message, so it will get stored: https://github.com/obsproject/obs-studio/pull/5875/commits/5...


That branch is on a different fork (PatTheMav's), so they wouldn't be able to do that in this case.


TIL. Thanks.


Does this work with cert pinning on Android? I was only ever able to bypass that by rooting my device and installing an Xposed module to bypass the pin check.


There's a detailed Android guide here: https://httptoolkit.tech/docs/guides/android/

In short, most of the time you need to either:

- Connect an Android emulator or a rooted device to ADB, in which case HTTP Toolkit can do totally automated setup for you.

- Use a non-rooted device, and make some minor config changes to the target application (trivial if it's your own application, slightly more difficult if it's not).

That handles 99% of Android apps, which usually don't actually pin certificates - they generally rely on Android's built-in non-modifiable system certificate store instead.

Lots more detail on how this all works here: https://httptoolkit.tech/blog/intercepting-android-https/

For apps that really do manually pin certificates, I've also written a general purpose Frida script that covers most cases out of the box. There's a full guide with more detail here: https://httptoolkit.tech/blog/frida-certificate-pinning/. And if even that doesn't work, I've also written a "reverse engineering an Android app from scratch so you can write you own Frida script" guide here: https://httptoolkit.tech/blog/android-reverse-engineering/


Your postings are awesome.


httptoolkit is best software in market that works so easily and can bypass certs pinning.

Here are steps: Download frida script from httptoolkit server and binary from frida github repo and download httptoolkit app in andriod. Here are my notes.

``` # Copy the server to the device adb push ./frida-server-$version-android-$arch /data/local/tmp/frida-server # ^Change this to match the name of the binary you just extracted

# Enable root access to the device adb root

# Make the server binary executable adb shell "chmod 755 /data/local/tmp/frida-server"

# Start the server on your device adb shell "/data/local/tmp/frida-server &"

pip3 install frida-tools frida-ps -U frida --no-pause -U -l ./frida.js -f com.appname

# derived from https://httptoolkit.tech/blog/frida-certificate-pinning/ ```


Frida? That's https://frida.re/ ?


yea :)

You can download server binaries from here https://github.com/frida/frida/releases


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: