Hacker News
Killswitch: Per-function short-circuit mitigation primitive
logdahl
|next
[-]
PeterWhittaker
|next
|previous
[-]
cyanydeez
|root
|parent
[-]
Phelinofist
|next
|previous
[-]
ARob109
|root
|parent
[-]
BPF LSM if you want to return -EPERM.
Or a kprobe that kills the process via bpf_send_signal() if BPF LSM isn’t enabled.
[0] https://github.com/cozystack/copy-fail-blocker#how-it-works
DoctorOetker
|next
|previous
[-]
still i believe this is the right direction
frumiousirc
|next
|previous
[-]
tosti
|next
|previous
[-]
IIRC canonical makes patches for official ubuntu kernels but acts like a Chinese restaurant (closed kitchen, orders come in through a small hatch behind the counter)
xuhu
|next
|previous
[-]
luka598
|next
|previous
[-]
SwellJoe
|root
|parent
|next
[-]
Edit: This also reminds me that I've begun to judge projects by whether the developer has public code from before AI. I'm more likely to trust their new code. Which causes me concern about the pipeline for new developers...how am I supposed to know a new user on Github has enough understanding of how software works to be shipping software? It used to be that if a new project by a new dev had good docs, some kind of test coverage, and a coherent git history, I could infer some level of quality. Not true, now, so I probably move on and look for something from someone with a pre-AI track record.