← Back to context

Comment by JohnLeitch

20 hours ago

Well, I spent a good part of my career reverse engineering network protocols for the purpose of developing exploits against closed source software, so I'm pretty sure I could do this quickly. Not that it matters unless you're going to pay me.

So you are basically overqualified to tell other people how to do it, especially with the payment part.

  • What are you even trying to say? I suppose I'll clarify for you: Yes, I'm confident I could have identified the cause of the mysterious packets quickly. No, I'm not going to go through the motions because I have no particular inclination toward the work outside of banter on the internet. And what's more, it would be contrived since the answer has already shared.

    • I think the point they're making is that "I, a seasoned network security and red-team-type person, could have done this in Wireshark without AI assistance" is neither surprising nor interesting.

      That'd be like saying "I, an emergency room doctor, do not need AI assistance to interpret an EKG"

      Consider that your expertise is atypical.

      3 replies →