Hacker Newsnew | past | comments | ask | show | jobs | submit | kouiskas's commentslogin

Location: France

Remote: Yes

Willing to relocate: No

Linkedin: https://www.linkedin.com/in/gillesdubuc/

Email: gilles [at] dubuc.fr

Calendly: https://calendly.com/gi11es

Engineering leader with 20 years of experience on large scale web projects. I’ve remotely led fully distributed teams of engineers to architect, build, ship and run scalable distributed systems with up to 1B+ unique devices per month (Wikipedia). I’ve worked for large established organizations as well as fast growing startups. I love building healthy engineering cultures and growing engineers, helping them deliver their best work while working on complex projects.


On this debate people are confusing artistic illustration skills with creating art. An artist created this artwork at the state fair, not the AI. The artist had a vision, directed the AI towards that outcome and selected the result they wanted.

Some very famous artist exposed in museums today don’t physically hold the tools that « make » the artwork, they direct a team of assistants who act as their hands. Some like to hold the paintbrush themselves but they don’t have to and that’s why it’s not a criteria for whether they are the artist or not.

Much like a movie director directing a team to create a movie doesn’t hold the mic boom or deal with the photography themselves. They orchestrate other humans into creating the piece of art they have envisioned.

This is exactly the same. Instead of a known visual artist directing art students to fabricate the artwork they’ve envisioned, the artist directs the AI.


Getting good AI art requires finding the right prompt and sorting through potentially hundreds of pictures. Picking out the one that embodies your idea (or sometimes the one that stands out among the rest that you would never have expected from that input prompt) is the way you turn AI output into art.


See also "generative art" which has been around for a few decades. There's still a human curating + tweaking the end result.

https://en.wikipedia.org/wiki/Generative_art


> The artist had a vision, directed the AI towards that outcome and selected the result they wanted.

And a monkey randomly pressing keys on a typewriter will eventually type the entire Bible

The point is the barrier to entry and the skills required dropped, it dropped so far that you now need no skills besides writing a sentence and clicking on an image. We've became the proverbial typewriter monkey


I guess by this logic, Elon Musk really is the real life Iron Man.


I’m talking about concrete examples of well-known artists, let’s not confuse this with the delusions of sociopathic CEOs taking credit for other people’s work and constructing a fictional vision a posteriori for the media. There’s nothing artistic there.


I charge my EV with free solar energy 90% of the time. Can't dig my own gas out of the ground for an ICE. Hopefully that kind of setup will become cheaper and more accessible to many.

EVs aside, every bare roof is a missed opportunity for solar anyway. It should be mandatory for every overground parking lot to be covered in solar panels, same for every newly built residential and office building. If this sort of policy was in place, there would be a lot more locally generated electricity for heating and charging EVs that doesn't need to be transported over long distances.


Wikimedia Foundation

Many positions are REMOTE (or in SF if you want), some are SF-only. VISA help/sponsorship provided for candidates willing to relocate to SF. There are also INTERN positions open right now.

http://wikimediafoundation.org/wiki/Work_with_us#Wikimedia_C...



Some ideas...

- using tools like http://www.pictriev.com/ or similar offline solutions to get a pretty good estimate of her age.

- using image analysis to "fingerprint" the camera used to take the picture. Then crawling sites where she would be likely to post pictures (twitter, etc.) based on the suspected area and comparing to find matches (i.e. pictures taken with the same camera). I'm not sure what the current state-of-the-art is for those algorithms, but if for instance the camera displayed an obvious visible flaw (darker spot), it would have made it easier. On a perfectly clean camera without visible defects I assume that more than one picture is necessary for effective camera fingerprinting.

- using tools like http://graphics.cs.cmu.edu/projects/im2gps/ to try and determine the location just based on visual features.


They were using and probably are still using unsalted MySQL 4.1+ PASSWORD()

https://news.ycombinator.com/item?id=5677550


They mentioned they're using bcrypt in the comments:

http://www.name.com/blog/general/2013/05/we-got-hacked/#comm...


They're lying or confused, the data I have is definite proof. 9gag's password and ours were hashed unsalted with MySQL's PASSWORD(). I'll reply on that comment.


He seems to be correct. Here's the comment with more information: http://www.name.com/blog/general/2013/05/we-got-hacked/#comm...


name.com's passwords were (still are?) not encrypted. They're unsalted MySQL 4.1 PASSWORD() hashes.


Where did you get this information from?

I was curious what algorithm is behind the MySQL PASSWORD() method. According to the MySQL reference manual, "you should not use it in your own applications. For that purpose, consider MD5() or SHA1() instead."[1]

1: https://dev.mysql.com/doc/refman/4.1/en/encryption-functions...


https://news.ycombinator.com/item?id=5677550

Hint: I'm the head of ops, the password matched what I had set (16 characters, mix of letters, numbers and symbols, not used anywhere else).


Also, in addition to confirming that our own hash was genuine, 9gag's password was very weak and their hash can be reversed with online rainbow tables.


The name.com sample data HTP showed in their log by querying the database was real. Source: I work for one of the companies they used as sample rows when querying the name.com DB. Our head of ops confirmed that the hash in the HTP log was indeed the MySQL 4.1 PASSWORD() unsalted hash of our password at the time. name.com is kind of generous with the term "encrypted" in their email.


Looking at the hash found in the query HTP ran, 9gag's name.com password was "harry1" at the time of the exploit. It also tells us name.com stores the passwords as unsalted MySQL 4.1 PASSWORD() hashes...


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: