

What you’re referencing is distillation. Anthropic even has an article on distillation “attacks” (as if they have some divine right to the data behind their models) that goes over it a bit.


What you’re referencing is distillation. Anthropic even has an article on distillation “attacks” (as if they have some divine right to the data behind their models) that goes over it a bit.


recovery email which they did not hash
How do you recover an account on the other providers? Do you have to provide the same recovery email you set before during account recovery? If you hash the email, you have no way of reading it anymore, so someone has to provide it to you again.


I’ve had laptops where this is a BIOS setting. A simple switch on the side of the keyboard to flip which keys are on the fn layer solves the problem too. Same with key remapping, for keyboards that support that (and really any nice keyboard should or it’s not worth the cost).


Also,i’m sure you know this, but security through obscurity is a poor systems design choice in almost all scenarios.
The only time I can think of from the top of my head where obscurity aids security is when secret keys are kept obscure. This isn’t even what people mean by “security through obscurity” though, so I’d actually beg someone to give an example where obscurity is actually beneficial to security and doesn’t just give a false sense of security instead.
That’s not to say everything can or should be open source, of course, just that relying on it being closed source for your application to be secure is a good way to open yourself up to attacks.


What does any of this have to do with GPL or open source licenses? Military applications all have strict validation requirements that rule out the majority of open source anyway, and your first example doesn’t even explain how the software being open source would be dangerous at all. Actually, for that matter, nor does the military example. Encryption doesn’t work because the other party doesn’t know your algorithm lol, it works because the other party doesn’t know your secret keys.


I would expect the jury to be nothing less than world-class experts on statistics, linear algebra, and calculus once the case is decided.


If you’re referring to GPL variants, that depends. You can absolutely use GPL software and libraries with closed source software. You just need to separate the GPL portions from the closed source portions with some sort of boundary, like running it as a service of some sort or turning it into a CLI tool. You’re just not allowed to create derivative works of GPL software that isn’t also GPL.
Also, there should be nothing dangerous about open sourcing code (unless you’re referring to financial risk to the business I guess). Secrets should never live in code, and obscurity is never secure.


In good news, we got a summary of his 9950x3d2 review, which was basically that it’s a ripoff at $900. Unironically, if you’re somehow in the market for a CPU like that, consider either the 9950x3d for productivity and core count, or the 9800x3d for gaming. The 9950x3d2 brings nothing to the table for anyone outside of maybe some niche applications which need both core count and cache size and can afford the latency for data transfers between CCDs.
Or, I guess, don’t buy anything because all the companies suck and everything is unbelievably expensive. Who needs a computer anyway?


Silicon Valley owes a moral debt to the country that made its rise possible. The engineering elite of Silicon Valley has an affirmative obligation to participate in the defense of the nation.
I agree with this. They have a duty to permanently rid the world of these sick fucks, especially for the sake of defending their country from them and people like them.


Here’s hoping John Apple does what it takes to make me actually consider an Apple device! Like, I don’t know, making user-friendly decisions without the EU getting on their ass about it first.


My phone’s keyboard lets me compose multiple dashes into an emdash. I believe I can also bind a compose key on my desktop, though I haven’t needed it there yet.


They’re able to hit the ground running.


Could also buy a device and not connected it to a cellular network. I have old phones that would fill this role perfectly, actually.


It’s not FOSS, but the only thing that stands out to me as non-FOSS is that it can’t be repackaged into a product or service that charges money for use. As a standalone tool, people appear to be free to use it and modify it all they want (subject to the share-alike restrictions), even if they use the output of the tool for commercial purposes.


You see, the problem is they used Outlook (New) and Outlook (For Work & School) rather than Outlook (Space). If they just used the web version, it would have been fine too, as long as they used Edge (Space) anyway.


The output of a model isn’t speech protected by the 1st amendment, so this lawsuit is dumb. It’ll of course waste time and money though.


She’s literally just doing her own version of the MrBeast face. It’s not even that unique. Half the people I watch on YouTube slap their face in their thumbnail, and I don’t watch clickbaity slop.
Just install DeArrow, enable thumbnails through it if needed, and move on.


For roughly the price of a single 9800x3d*, you can buy a complete laptop with a long lasting battery and decent enough specs for web browsing, video playback, and basic office work. It’s unfortunately one of the better devices on the market at that price, especially accounting for the battery life.
*Edit: okay the processors came down in price. Fine, the cost of a kit of decent DDR5 memory, then.
Apple selling a ‘repairable’ and low-end device just looks like a recession indicator to me.
One of the few, I take it?


The lawsuit says Apple did more than just link to content. It claims Apple got around YouTube’s protections to download and use videos directly. The creators argue this breaks the Digital Millennium Copyright Act, which bans getting past systems meant to protect copyrighted material.
Nah they can lose that lawsuit fuck that. Not about to see DMCA section 1201 used to block everyone from using a YouTube video ever in any other content.
While I’m interested to see the proof, it’s more of a formality. It doesn’t take a PhD to ask what happens when the “AGI” LLM is trained on out of date information. They don’t learn over time, and they have a limited context buffer. At the very minimum, it would run out of context just keeping up with changes to spoken language over 30 years, let alone advancements in fields, new fields, and so on.