hikaru755
@hikaru755@feddit.de
- Comment on OpenAI’s latest model will block the ‘ignore all previous instructions’ loophole 3 months ago:
That’s already happening. Slightly different example, but Home Assistant has an integration that gives an LLM of your choice control over your home automation devices. Just talking to your home in natural language without having to memorize very specific phrases is honestly pretty powerful, as long as it works correctly. You can say stuff like “hey it’s a bit dark in the office”, and it just knows to either switch on the office lights, or make them brighter if they’re already on
- Comment on [deleted] 5 months ago:
Except discord is not ads-based? I’ve never seen a third party ad on there
- Comment on Stack Overflow bans users en masse for rebelling against OpenAI partnership — users banned for deleting answers to prevent them being used to train ChatGPT 6 months ago:
It’s not quite that simple, though. GDPR is only concerned with personally identifiable information. Answers and comments on SO rarely contain that kind of information as long as you delete the username on them, so it’s not technically against GDPR if you keep the contents.
- Comment on Adobe's new generative AI tools for video are absolutely terrifying 6 months ago:
AI is just impossibly far away.
Sure it’s pretty far away, but it’s also moving at break neck speed. Last year low-res spaghetti-eating Will Smith body horror was the pinnacle of ai generated video, today we’re already generating videos that take at least a second look to determine that it was AI generated. The big question is at what point that improvement rate will start to level off.
- Comment on Zuckerberg says Meta's Llama 3 is really good but no chatbot is sophisticated enough to be an 'existential' threat — yet 6 months ago:
I mean… It might be. Just depends on how much potential there still is to get models up to higher reasoning capabilities, and I don’t think anyone really knows that yet
- Comment on Tennessee legislature passes bill banning marriage between first cousins 7 months ago:
Well in your original comment you were just talking about “incest” generally, and then going on to mention you marrying your first cousin as a hypothetical example. That made it seem like you would want a child coming out of that relationship to be criminalized, and that’s what I was responding to. For direct siblings it might indeed be another matter.
- Comment on Tennessee legislature passes bill banning marriage between first cousins 7 months ago:
But there are enough situations where it is easily known, even without genetic testing. I’m only talking about those. Why shouldn’t those be criminalized then, too?
- Comment on Tennessee legislature passes bill banning marriage between first cousins 7 months ago:
having biological kids born out of incest should be criminalized as that comes under child abuse
It’s the same as any other situation where a couple has known genetic traits that make birth defects much more likely. Why should it be criminalized if the parents are related, but not when the parents are unrelated, even though the outcome for the child is the same?
- Comment on With public key cryptography, why can't someone decrypt a message using the public key? 7 months ago:
Yup, you got it. Even the solution to your confusion. Good encryption algorithms are set up so that even the smallest possible change in the input (a single flipped bit) will produce a completely different result. So yeah, if you have just a small set of exact possible messages that could be sent, you can find out which one it was by encrypting it yourself and comparing your result to what was sent. But there is a super easy protection against this - just add some random data to the end of the message before encrypting it. The more, the harder it will be to crack.
- Comment on Comcast reluctantly agrees to stop its misleading “10G Network” claims 9 months ago:
Ah. Well the first comment in this chain talked about mobile devices, so I was assuming we were talking about mobile data plans
- Comment on Comcast reluctantly agrees to stop its misleading “10G Network” claims 9 months ago:
Uhh… Germany would like to have a word
Most carriers do offer some uncapped plan, I think, but it’s expensive and not the default
- Comment on Inventor of NTP protocol that keeps time on billions of devices dies at age 85 9 months ago:
Every device in my house is within 1-second of every other.
Meanwhile, my new oven’s clock drifts by over a minute in just a few days after setting it to the correct time, smh
- Comment on DeepMind AI rivals the world’s smartest high schoolers at geometry 9 months ago:
From the article:
For many years, we’ve had software that can generate lists of valid conclusions that can be drawn from a set of starting assumptions. Simple geometry problems can be solved by “brute force”: mechanically listing every possible fact that can be inferred from the given assumption, then listing every possible inference from those facts, and so on until you reach the desired conclusion.
But this kind of brute-force search isn’t feasible for an IMO-level geometry problem because the search space is too large. Not only do harder problems require longer proofs, but sophisticated proofs often require the introduction of new elements to the initial figure—as with point D in the above proof. Once you allow for these kinds of “auxiliary points,” the space of possible proofs explodes and brute-force methods become impractical. Advertisement
So, mathematicians must develop an intuition about which proof steps will likely lead to a successful result. DeepMind’s breakthrough was to use a language model to provide the same kind of intuitive guidance to an automated search process.
- Comment on xkcd #2867: DateTime 11 months ago:
Exactly that! KISS is an often cited rule among software devs.
- Comment on xkcd #2867: DateTime 11 months ago:
It’s easier to understand, easier to review for correctness, and less likely to cause problems with additional changes in the future. Even though it sounds counterintuitive, software developers generally try to write as little code as possible. Any code you write is a potential liability that has to be maintained, so if you can instead just use code that others have already written and that has been tested, you’ll want to use that. (Note that “less code” doesn’t mean fewer lines of code, it means less logical complexity, which is often, but not always, also less in terms of characters/lines)
- Comment on xkcd #2867: DateTime 11 months ago:
Using YearMonth.atEndOfMonth would have been the easier choice there, I think
- Comment on according to my advent calender the 2nd december is a good day to die 11 months ago:
Looks very much like it! I’m a bit jealous, they were already out of stock when I looked at getting one
- Comment on Google Drive users say Google lost their files; Google is investigating 11 months ago:
This is why you don’t use any singular storage medium without backups
Ftfy. Using any medium as the exclusive location of your data without any backup is a stupid idea, but if you’re gonna be that careless, using Google Drive is one of the less stupid options out there. The chance that google fucks up in an irrecoverable way is infinitely lower than you fucking your local storage up or your house burning down.
Privacy is another factor to this of course, but if we’re just looking at the security of your data, using only Google is way better than using only your self hosted solution.
- Comment on I am God's greatest programmer 1 year ago:
There are some cases though where the code is just complicated for reasons outside of your control, in which case “what” comments are good - but they should never be taken at face value, but only used as a first step in understanding the code. There’s a significant risk of the code not actually doing what the comment says.
- Comment on How do you call someone born in the US besides "American"? 1 year ago:
You’re right that words can be coined and their usage changed, but you seem to be misinformed about how that happens. You just deciding we’re gonna do it this way now is not gonna cut it, sorry
- Comment on How do you call someone born in the US besides "American"? 1 year ago:
This is about language, not geology. Doesn’t really matter how it came to be that way, North and South America are effectively treated as separate continents and very rarely referred to as a whole, and you saying “but actually” doesn’t change that.
- Comment on Thousands of Android TV devices come with unkillable backdoor preinstalled 1 year ago:
Ah, right, makes sense. I’m using a steam controller (or any other controller with steam, honestly) instead of a mouse, which works well enough
- Comment on Thousands of Android TV devices come with unkillable backdoor preinstalled 1 year ago:
What’s wrong with using YouTube in a browser?
- Comment on Amazon reportedly used a secret algorithm to jack up prices — A new report details Amazon’s Project Nessie pricing algorithm 1 year ago:
I guess “secret” in the sense that not only the internals of the algorithm, but even the existence of the it is not quite public knowledge.
- Comment on The difference between equality, justice and equity. 1 year ago:
So what? This is not about creating an absolutely fair world, it’s about improving heavily unfair systems.
- Comment on [deleted] 1 year ago:
Because Edge is the default browser on the most widespread operating system. If you’re using Chrome, you very likely already switched once and are better informed than someone encountering the message on Edge.
- Comment on Why does Play Store prompt me to update Bitwarden? 1 year ago:
It’s a way to verify that an app, or any package of data really, actually comes from the source you’re expecting it to.
It’s based on some clever math, but basically, an app developer has two very large numbers that share a certain mathematical relationship, but if you only know one of them, it’s extremely hard to calculate the other one. One of those numberd (the private key) they keep securely to themselves, the other number (the public key) they publish permanently for everyone to see.
Now when the releases an app or an update to it, they put both the app and their private key into a special formula, which produces a new big number, called the “signature”. Then, they publish both the app and the signature to the play store.
Now, when your app store sees an update of the app, it won’t just blindly trust it, but first check that it’s actually legit, so that it doesn’t accidentally install a virus or something. To do that, it downloads the app and the signature, and puts them into another special function, together with the public key that was used to sign the version of the app that you currently have installed. Now the clever part is, because of the special mathematical relationship between the public key and the private key, this function can check whether the signature was in fact produced by combining the app with the private key of the developer, without actually having to know that private key. This way, it can now be sure that this app update is actually coming from the original developer - unless they have been compromised and their private key leaked.
This I very close to how (asymmetrically) encrypted messaging works, btw. If you have a key pair like above, you can encrypt a message with one of the keys in a way that it’s only decryptable with the other one. This way you can have people send you encrypted messages without anyone else knowing the encryption key, not even the sender of the message.