sudo jajos
309 subscribers
111 photos
14 videos
91 links
$ sudo jajos --verbose

Junior AI Engineer@iCogLabs|Oriental Orthodox|Just fascinated about anything fascinating 😁

Will share my thoughts and journey here
Download Telegram
sudo jajos
Video
From the votes I can see that most of u are eager to learn about ML and AI stuff and most of u have no prior experience... So yeah I will think about a scheme that will benefit us all ...


For those of u who depicted as having no prior experience and want to learn I recommend u view this video in the meantime ... But we will figure out the long future ... If u have any recommendations I am welcome
πŸ‘1πŸ”₯1
Christos Anesti, Alithos Anesti
Have a beautiful Sunday πŸ€—

"For the oppression of the poor, for the sighing of the needy, Now I will arise," says the LORD; "I will set him in the safety for which he yearns."
Psalm 12:5


#sunday
@byte_philosopher
❀‍πŸ”₯8
Forwarded from The Data Guy
Its fully Confirmed now That Anthropic is adding Ethiopia to Supported Countries List!!!

Its rolling from Claude code first!
πŸ‘1
After dinner let us not go to bed but to prayer, or we may become more irrational than the irrational beasts.

St. John Chrysostom

Lets pray before we sleep πŸ™, one αŠ α‰‘αŠ α‹˜α‰ αˆ°αˆ›α‹«α‰΅ would suffice
❀‍πŸ”₯15πŸ”₯3
In all you do, remember the end of your life, and then you will never sin
Sir 7:36


Let us start our day remembering this
❀8
We reached 300 πŸŽ‰ hoorayy ....

Thanks @all ... and @byte_philosopher almost ~ 45 people joined because of u ...
πŸŽ‰10
Forwarded from Eyob Daily
Man-in-the-Middle attack happens when a hacker secretly intercepts communication between two parties without them knowing.

You think you're talking directly to someone…
But the attacker is sitting in between, watching and sometimes changing everything.
Eyob Daily
Man-in-the-Middle attack happens when a hacker secretly intercepts communication between two parties without them knowing. You think you're talking directly to someone… But the attacker is sitting in between, watching and sometimes changing everything.
https://github.com/jajos12/basic_red_teaming

back then just for learning purposes I was experimenting with red teaming attacks ... u can see the details in the repo and one of them was ARP spoofing ... it is a basic MiTM attack ... and it goes as follows:

ARP (Address Resolution Protocol) bridges Layer 2 (MAC addresses) and Layer 3 (IP addresses) of the network stack. When your computer wants to send a packet to 192.168.1.1, it needs to know the MAC address of that IP on the local network. It broadcasts:
"Who has 192.168.1.1? Tell 192.168.1.50"
The device at 192.168.1.1 responds:
"192.168.1.1 is at AA:BB:CC:DD:EE:FF"
Your OS stores this in the ARP cache β€” a table mapping IP addresses to MAC addresses. All subsequent packets to 192.168.1.1 are sent to MAC AA:BB:CC:DD:EE:FF at the Ethernet layer.

The Fatal Flaw
ARP has zero authentication. The protocol was designed in 1982 (RFC 826) when networks were trusted environments. There is:

❌ No verification that the sender is who they claim to be
❌ No cryptographic signing of ARP messages
❌ No way to distinguish legitimate replies from forged ones
❌ Devices accept unsolicited ARP replies (no request needed!)
This means any device on the network can lie about who owns any IP address.
❀1πŸ”₯1
sudo jajos
https://github.com/jajos12/basic_red_teaming back then just for learning purposes I was experimenting with red teaming attacks ... u can see the details in the repo and one of them was ARP spoofing ... it is a basic MiTM attack ... and it goes as follows:…
There are about 10 attacks described there ... and disclaimer it is for learning purposes only β—οΈπŸ˜ I mean it ...

I intentionally left the 7 uncommited but u can experiment with ARP, DNS spoofing and credential sniffing ....

If u have found something useful don't forget to give it ⭐️ https://github.com/jajos12/basic_red_teaming
This is so shocking

@byte_philosopher
πŸ’”1😐1
Yostina | Bytephilosopher
This is so shocking @byte_philosopher
I enjoyed A2SV(I was Generation 6) - but when I was leaving it - u know it was a shock also for me ... bcha Emre tchilaleh ... but u are surrounded with ignorant ... bcha mnm albel
πŸ‘3
Claude think I am a robot because I am from Ethiopia .. πŸ˜‚ it looped 5 times asking me again and again lol ...

VPN the life savior be it "app unavailable" or "u are robot" πŸ˜‚
😁5
መልካም αˆ°αŠ•α‰ α‰΅ πŸ’›

αŠ₯αŠ” α‰°αŠ›αˆ αŠ αŠ•α‰€αˆ‹α‹αˆαˆα€ αŠ₯αŒα‹šαŠ α‰₯αˆ”αˆ­αˆ α‹°αŒαŽαŠ›αˆαŠ“ αŠα‰ƒαˆα’
ከሚከα‰₯α‰‘αŠ ከአαŠ₯αˆ‹α αˆ•α‹α‰₯ አልፈራምፒ

αˆ˜α‹ 3 :5-6

@byte_philosopher
❀‍πŸ”₯5
The jealous person would prefer to suffer innumerable troubles rather than to see his neighbor in good repute, even if the cause of the good repute were to benefit him also. What could be more wretched than such a person?

St. John Chrysostom
❀9
sudo jajos
https://youtu.be/tpIctyqH29Q?si=eKoLPExAXx6aiHF4 This is an insane playlist for anyone from scratch to understand how computers work in macro level ... and u know literally it is for everyone ...
https://www.coursera.org/learn/build-a-computer

This is also very valuable material ... u will build ur own computer ...

I will take it ... I think my financial aid have expired(after 6 months it expires) and I should use another acc to apply ... bcha It is insane like it is project based betam ena at every module they give like ~ 2 hrs for lecture and ~ 3 - 6 hrs for implementing the things learnt
πŸ”₯2
sudo jajos
https://www.coursera.org/learn/build-a-computer This is also very valuable material ... u will build ur own computer ... I will take it ... I think my financial aid have expired(after 6 months it expires) and I should use another acc to apply ... bcha It…
now someone's gonna say ... "why even bother learning this stuff when ai is just gonna surpass us anyway"

bro. if we don't understand how things work at a fundamental level, we don't have a long future in this field. ai doesn't make deep knowledge useless β€” it makes it more valuable

like gpu design, computer architecture ... these things directly affect how ai is built and how far it can go. the people who will actually push things forward aren't just the ones using the tools, they're the ones who understand what's underneath well enough to rethink the tools entirely

we need to go beyond surface level and start thinking like researchers. and that starts with actually knowing how things work
πŸ”₯4