In the context of the kernel, it’s hard to say when that’s true. It’s very easy to fix some bug that resulted in a kernel crash without considering that it could possibly be part of some complex exploit chain. Basically any bug could be considered a security bug.
> The spontaneous explosions become so common and normalized that just about everyone knows someone who got caught up in one, a dead friend of a friend, at least
Over commit is a design choice, and it is a design choice that is pretty core to Linux. Basic stuff like fork(), for example, gets wasteful when you don't over commit. Less obvious stuff like buffer caches also get less effective. There are certainly places where you would rather fail at allocation time, but that isn't everywhere and it doesn't belong as a default.
The question that isn't answered completely in the article is how useful are the pipelines for these startups? The article certainly implies that for at least some of these startups there very little value add in the wrapper.
Right, but most browsers aren't owned by money-losing startups desperate for any bit of training data they can get their hands on as scaling taps out.
I really doubt OpenAI consciously wants my passwords, but I could absolutely see a poorly-coded (or vibe-coded, lol) OpenAI process somehow getting my keychain into their training set anyway, and then somebody being able to ask Chat-GPT 6, "hey, what's Analemma_'s gmail password?" and it happily supplying it. The dismal state of LLM scraper behavior and its support (or lack thereof) of adherence to best practices lends credibility to this.
reply