Lightfire228
@Lightfire228@pawb.social
- Comment on DuckDuckGo poll says 90% responders don't want AI 1 week ago:
Because that’s how most people implicitly frame headlines like this one: a generalization of the public
- Comment on TikTokers are heading to UpScrolled following US takeover 1 week ago:
Oh i know
I’m more blaming the system than the user. The system is designed to be as addicting as possible. Literally a century of addiction research into drugs and gambling, all used to squeeze every drop of engagement from the user
- Comment on TikTokers are heading to UpScrolled following US takeover 1 week ago:
Anything to get that dopamine drip from the Black Rectangle
- Comment on Microsoft Windows 365 goes down the day after Microsoft celebrates 'reimagining the PC as a cloud service that streams a Cloud PC' 1 week ago:
It’s not about what the user wants. It’s about what will make the most profit for Microsoft
- Comment on Cmon now :( 2 weeks ago:
Ohhhh
Big MAC address
- Comment on Oh nooooooo 3 weeks ago:
You’d think we’d have accidentally bred smarter deer by now
- Comment on The Legend of Zelda: Twilight Princess is 100.00% decompiled 1 month ago:
Legend of Zelda: Majora’s Ocarina of Twilight
- Comment on The Legend of Zelda: Twilight Princess is 100.00% decompiled 1 month ago:
LoZ: Twilight Majora’s Ocarina
- Comment on The Legend of Zelda: Twilight Princess is 100.00% decompiled 1 month ago:
Source code is just text with special grammar rules, that’s easy for a human to read and think about. But it’s not possible for a computer to execute source code directly.
So it’s run through a “compiler”, which takes the text and compiles it into binary machine code (x86 Assembly). This is what gets written to the CD and shipped
“decompilation” is the process of starting from the raw machine code, and trying to figure out what source code text could have generated that machine code.
Typically you use a tool that can do an initial decomp pass, but since it’s missing a lot of context, the resulting text is generally incomprehensible. Variable
x123ieh48hdccould be Link’s velocity, the currently loaded map, or it could be a temporary scratch variableThe real challenge to decomp is figuring out which incomprehensible variable and function names actually correspond to in-game
(Note, usually “100% decomp” means they’ve fully translated machine code to source code. But there may still be large parts of the source code that remain incomprehensible. Ocarina of Time decomp still has sections like this)
- Comment on 1 month ago:
Null island?
- Comment on Gotta poop 1 month ago:
OwO
- Comment on 700+ self-hosted Git instances battered in 0-day attacks 1 month ago:
But it doesn’t have any built-in concept of users, write permissions, or authentication (except for commit signing)
Hosting an unauthenticated git repo would be the equivalent to an open ssh port with no password
Not to mention collaborative things like issue tracking, PRs, forums, etc
- Comment on 700+ self-hosted Git instances battered in 0-day attacks 1 month ago:
I wonder if it’d be feasible to make a fediverse github
- Comment on Expecting a LLM to become conscious, is like expecting a painting to become alive 2 months ago:
can solve that we don’t think are solvable by sufficiently large computers
That is a really good point…hrmmm
My conjecture is that some “super Turing” calculation is required for consciousness to arise. But that super Turing calculation might not be necessary for anything else like logic, balance, visual processing, etc
However, if the brain is capable of something super Turing, I also don’t see why that property wouldn’t translate to super Turing “higher order” brain functions like logic…
- Comment on Expecting a LLM to become conscious, is like expecting a painting to become alive 2 months ago:
I don’t think the distinction between “arbitrarily large” memory and “infinitely large” memory here matters
Also, Turing Completeness is measuring the “class” of problems a computer can solve (eg, the Halting Problem)
I conjecture that whatever the brain is doing to achieve consciousness is a fundamentally different operation, one that a Turing Complete machine cannot perform, mathematically
- Comment on Lemmy users who say that Lemmy users are smarter than Reddit users 2 months ago:
But… But programming is fun…
- Comment on Expecting a LLM to become conscious, is like expecting a painting to become alive 2 months ago:
I suspect Turing Complete machines (all computers) are not capable of producing consciousness
If that were the case, then theoretically a game of Magic the Gathering could experience consciousness (or similar physical systems that can emulate a Turing Machine)
- Comment on An argument for using plastic straws: 2 months ago:
Why not fully silicone straws?
- Comment on Breaking: Google is easing up on Android's new sideloading restrictions! 2 months ago:
Waydroid doesn’t intend on supporting it. It’s a piece of code that checks for evidence of “tampering” (such as an unlocked bootloader, or root access), and sends those bits of data off to Google’s servers for verification
It’s antithetical to Waydroid and device freedom, and is used by banking apps for “security” reasons, as well as media apps for piracy reasons
And is a massive pain for anyone who root’s their devices
- Comment on Breaking: Google is easing up on Android's new sideloading restrictions! 2 months ago:
What about Play Integrity / Safetynet?
- Comment on owo 2 months ago:
OwO
- Comment on Ain't no one breaking in 2 months ago:
Yes, and no.
If the password is stored properly (hashed and salted), then a high entropy PW will make it nearly impossible for your PW to be extracted from a database dump / data leak
On the other end, if the PW is stored as plain-text, a high entropy PW is useless.
In between, a weak hash algorithm or no salt, a high entropy PW still makes it much harder to extract, but it depends
In general, 2FA is more secure, since it combines 2 different methods of authentication.
- something you know: password
- something you have: the 2FA token (usually on a phone)
This protects the service (as well as the user) against a broader range of attacks. Such as
- password reuse (which nearly everyone does)
- this is particularly bad, because you’re increasing the chance that a weakly designed system will have it’s data stolen, your reused PW and username included
- phising attempts
- low entropy passwords
- replay attacks
- since 2FA tokens are usually time bases (TOTP), they expire after a few minutes and can’t be reused if an attacker manages to intercept one
Among others
- Comment on Breakthrough gel can regenerate tooth enamel within weeks 2 months ago:
According to the article, they used human teeth from cadavers
- Comment on Protip: Don't lose count 2 months ago:
Ah, ok
He’s satire
I just assumed he was another one of those McDojo idiots
- Comment on Protip: Don't lose count 2 months ago:
- If you’re in this situation, you’ve got about a 95% chance of being boned, regardless of what training you have
- The fuck is that dude doing wearing a coral belt
- Comment on Maybe there was a cure for human cancer, but it didn't work at all in mice. 2 months ago:
imo, there’s no single “cure” for cancer, because it’s not a single disease
- Comment on Or two generations... 3 months ago:
The yeast of thoughts and mind
- Comment on Or two generations... 3 months ago:
globglogabgalab
- Comment on Your last words being "Whoops", probably greatly increases the odds that someone writes about your death 3 months ago:
UwUpsie daisy
FTFY
- Comment on Google's shocking developer decree struggles to justify the urgent threat to F-Droid 4 months ago:
I dunno how viable it is, but linux phones with waydroid is a thing
Also, I’d imagine that a small pocket of custom ROM amd root folks will still exist
Come hell or high water, i will retain control of my phone