theterrasque

joined 1 year ago
[–] [email protected] 16 points 1 week ago (2 children)

You fucking imbecile. If women are locked in the bedroom how can they make dinner?? Moran

[–] [email protected] 1 points 2 weeks ago

Banks hate this simple trick

[–] [email protected] 9 points 3 weeks ago (1 children)

Blowing up? Seen conservative discussion areas? Their godking is not only one of the working class now, but he owned all the democrats and made Harris look like a fool. He's a master troll doing 4d chess!

[–] [email protected] 1 points 3 weeks ago

They built a space laser?

[–] [email protected] 3 points 4 weeks ago

It’s a watch that says you have no taste.

They know their target demographic

[–] [email protected] 5 points 4 weeks ago (1 children)

Hah. Snake oil vendors will still sell snake oil, CEO will still be dazzled by fancy dinners and fast talking salesmen, and IT will still be tasked with keeping the crap running.

[–] [email protected] 10 points 4 weeks ago (3 children)

This has a lot of "I can use the bus perfectly fine for my needs, so we should outlaw cars" energy to it.

There are several systems, like firewalls , switches, routers, proprietary systems and so on that only has a manual process for updating, that can't be easily automated.

[–] [email protected] 3 points 1 month ago* (last edited 1 month ago)

Most phones these days use randomized MACs

https://www.guidingtech.com/what-is-mac-randomization-and-how-to-use-it-on-your-devices/

Not sure if that is for BT too, but looks like there is some support for it in the standards

https://novelbits.io/how-to-protect-the-privacy-of-your-bluetooth-low-energy-device/

https://novelbits.io/bluetooth-address-privacy-ble/

The recommendation per the Bluetooth specification is to have it change every 15 minutes (this is evident in all iOS devices).

So seems like it is implemented on some phones at least

https://www.bluetooth.com/blog/bluetooth-technology-protecting-your-privacy/

From 2015. So this seems to be a solved problem for a decade now

[–] [email protected] 6 points 1 month ago

That's because they don't see the letters, but tokens instead. A token can be one letter, but is usually bigger. So what the llm sees might be something like

  • st
  • raw
  • be
  • r
  • r
  • y

When seeing it like that it's more obvious why the llm's are struggling with it

[–] [email protected] 1 points 1 month ago

In many cases the key exchange (kex) for symmetric ciphers are done using slower asymmetric ciphers. Many of which are vulnerable to quantum algos to various degrees.

So even when attacking AES you'd ideally do it indirectly by targeting the kex.

[–] [email protected] 12 points 1 month ago (1 children)

I generally agree with your comment, but not on this part:

parroting the responses to questions that already existed in their input.

They're quite capable of following instructions over data where neither the instruction nor the data was anywhere in the training data.

They're completely incapable of critical thought or even basic reasoning.

Critical thought, generally no. Basic reasoning, that they're somewhat capable of. And chain of thought amplifies what little is there.

view more: next ›