cypherpunks

joined 2 years ago
MODERATOR OF
[–] [email protected] 2 points 20 minutes ago (1 children)

I really don’t get how its different than a search engine

Neither did this guy.

The difference is that LLM output is (in the formal sense) bullshit.

[–] [email protected] 9 points 2 weeks ago (1 children)

That label is there because I'm subscribed to XBlock Screenshot Labeller and it misclassified this image. (You can find here and here more info about how labelers in ATP work...)

[–] [email protected] 13 points 2 weeks ago (1 children)

i hope you're joking but if you're not i assume you live in the bay area? if you want to go to their pitch tonight, here's its eventbrite.

 

cross-posted from: https://lemmy.ml/post/19628702

image transcriptscreenshot of this bluesky post (which you can read without logging in here) from ‪@comraderobot.bsky.social‬ ("Notorious RBMK") saying:

my friend who still lives in palo alto gave me permission to share this mailer he got.

there’s unhinged and then there’s tech unhinged

image in post has two photos of people wearing EEG electrodes, one xray of a human head, an EEG data plot over a silhouette of a head, and this text:

REM sleep is the next Al

The upcoming era of physical reality integrated with dream worlds advanced by the REMspace startup

  • Controlling a smart home from dreams
  • Transferring speech from dreams
  • Controlling virtual cars from dreams
  • Interacting with dream worlds using brain implants
  • Social media for sharing dream journals
  • Smart sleep masks powered by Al
  • Many other breakthroughs from our lab (videos and tech)

Don't miss the pitch of the year for potential partners and investors

Aug 29th Palo Alto

Above the image is an (inaccurate) BlueSky label saying "Possible tumblr screenshot" with a "hide" button.

--

the guy behind this startup:

[–] [email protected] 6 points 2 weeks ago

That pin can be found for $30 or $35 on on ebay here and here, where it is described as being from the 80s and as an "employee pin".

I was thinking that this might have been something aimed specifically at technology buyers in US schools in the 80s or 90s, to whom Apple offered substantial institutional discounts in a (relatively successful) effort to dominate that sector. However searching the phrase "does more costs less" i found this TV spot advertising the Quadra 605 which at $1000 was the cheapest computer Apple sold when it was introduced in October 1993 (and allegedly cheaper than something else they refer to as "PC Leading Brand" 😂). That system was sold under the LC and Performa brands up to 1996, but it was only sold as a Quadra until October 1994, so, to answer OP's question: that slogan was in use at least sometime in that year.

[–] [email protected] 4 points 2 weeks ago (1 children)

Geordi La Forge pointing in approval (lower half of the Geordi variant of the Drakeposting meme format) ip -br a

(-br is short for -brief and makes ip's addr, link, and neigh commands "Print only basic information in a tabular format for better readability.")

[–] [email protected] 13 points 2 weeks ago* (last edited 2 weeks ago)

If copyright holders want to take action, their complaints will go to the ISP subscriber.

So, that would either be the entity operating the public wifi, or yourself (if your mobile data plan is associated with your name).

If you're in a country where downloading copyrighted material can have legal consequences (eg, the USA and many EU countries), in my opinion doing it on public wifi can be rather anti-social: if it's a small business offering you free wifi, you risk causing them actual harm, and if it is a big business with open wifi you could be contributing to them deciding to stop having open wifi in the future.

So, use a VPN, or use wifi provided by a large entity you don't mind causing potential legal hassles for.

Note that if your name is somehow associated with your use of a wifi network, that can come back to haunt you: for example, at big hotels it is common that each customer gets a unique password; in cases like that your copyright-infringing network activity could potentially be linked to you even months or years later.

Note also that for more serious privacy threat models than copyright enforcement, your other network activities on even a completely open network can also be linked to identify you, but for the copyright case you probably don't need to worry about that (currently).

[–] [email protected] 65 points 1 month ago (1 children)

he wouldn’t be able to inject backdoors even if he wanted to, since the source code is open

Jia Tan has entered the chat

 

cross-posted from: https://lemmy.ml/post/14733630

image descriptionStandard "they don't know" meme format, featuring line art of "That Feel Guy" wearing a party hat standing in a corner while other people are dancing. An image of an icosahedron formed by three mutually perpendicular golden ratio rectangles sits in front of That Feel Guy. The caption text says "They don't know that three mutually perpendicular golden ratio rectangles, with edges connecting their corners, form a regular icosahedron."

https://en.wikipedia.org/w/index.php?title=Regular_icosahedron&oldid=1219666251#Construction

 

image descriptionAn infographic titled “How To Write Alt Text” featuring a photo of a capybara. Parts of alt text are divided by color, including "identify who", "expression", "description", "colour", and "interesting features". The finished description reads “A capybara looking relaxed in a hot spa. Yellow yuzu fruits are floating in the water, and one is balanced on the top of the capybara’s head.”

via https://www.perkins.org/resource/how-write-alt-text-and-image-descriptions-visually-impaired/

 

transcriptScreenshot of github showing part of the commit message of this commit with this text:

Remove the backdoor found in 5.6.0 and 5.6.1 (CVE-2024-3094).

While the backdoor was inactive (and thus harmless) without inserting
a small trigger code into the build system when the source package was
created, it's good to remove this anyway:

  - The executable payloads were embedded as binary blobs in
    the test files. This was a blatant violation of the
    Debian Free Software Guidelines.

  - On machines that see lots bots poking at the SSH port, the backdoor
    noticeably increased CPU load, resulting in degraded user experience
    and thus overwhelmingly negative user feedback.

  - The maintainer who added the backdoor has disappeared.

  - Backdoors are bad for security.

This reverts the following without making any other changes:

The sentence "This was a blatant violation of the Debian Free Software Guidelines" is highlighted.

Below the github screenshot is a frame of the 1998 film The Big Lebowski with the meme caption "What, are you a fucking park ranger now?" from the scene where that line was spoken.

view more: next ›