They embed for a reason… And the captchas wouldn’t exist if they weren’t embedded anywhere
They embed for a reason… And the captchas wouldn’t exist if they weren’t embedded anywhere
No, you’re wrong, the Traffic Light examples ARE specifically to gather data to train models.
No you’re wrong, because the sites that embed those captchas on their page are not doing that to help good.
If people just wanted a good captcha they wouldn’t need hundreds of millions of photos of street lights and bicycles.
Yes, they are getting something productive out of the human labor that would be done anyways. Trust me as a web developer, and web scraper, some kind of captcha is necessary for many free services to be useful/economically viable. The core of a good captcha is just making it marginally more expensive for the scraper/bot than it is for you.
That’s why companies like Oxylabs exist
Aren’t these Captchas designed to get training data for AI models anyway?
Yes and no, the captchas are just meant to be hard for computers to solve but easier for humans. People saw that, and thought that “if we’re making people do this might as well have them do something useful” not meant to be malevolent- and the purpose is still stopping bots, training them is a side-effect.
Just means they’ll get harder, but maybe not for people, just needs to be harder for a computer
Depends on the case, sometimes its unavoidable.
No, you’re still misunderstanding what’s being done. ${server_service}
is an injected string, the string is the whole contents of the file. That file is not stored locally on the server, except through being injected here(by a terraform file template). And no, printf
won’t be any better than echo
because its not format string, and I don’t want any formatting from printf applied to it.
I’m reading this and interpreting that line 27 of that script is
And your interpretation is wrong. Line 27 is actuallly
sudo echo "${server_service}" > /lib/systemd/system/server.service
${server_service}
is read from the file I posted in the 2nd image. Since it was a test script I hadn’t bothered implementing any escaping tools, I wanted to make sure terraform allowed this first.
there is no purpose other than legacy of having replaced other commands
terraform(really is just a injection of a file() into a shell script)
I don’t think I did(though sometimes I do accidentally because of the Jeroba app UX)
No, because neither of those are the inputs. The input was the systemd file in the image. The whole command was not printed in the error, only surrounding context. The single-quote was indicating the ending of that context(because it was the end of the line) printed by the error.
The same thing was done with `)'
on the first line of error
I don’t disagree, but this time its my fault
Sadly no, its injected with terraform templatefile
, I already looked for a normal way to autoescape it, but from a brief look I couldn’t find one. I know there is a replace function that can take regex(RE2, which from my understanding prohibits *
in lookbehinds)- but the simplest regex I could think of at nearly 6am for capturing only non-escaped quotes is /(?:^|[^\\])(?:(?:\\\\)+|[^\\]|^)(?'quote'")/gm
. Though, I just realized if the quotes are escaped I would want to double escape them, so actually replacing all quotes with escaped quotes should be fine, also another limitation of this method is lines can’t have trailing \
To avoid having it hosted separately its injected into a shell script as a string
dsygraphia, I meant to say escape the quotes(you can see that because the comment wasn’t about comments but was instead about quotes)
The same is true for JVM bytecode, and C operations really are just aliases for ASM operations, and ASM (sometimes) is just aliases for microcode operations
No I meant, what was the grant process? As in, just applying for it, or selected for it?
Did you just apply for it?
Yes like I said, the challenges were picked to be useful. But some form of challenge would’ve been chosen regardless.