Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IP
Posts
3
Comments
892
Joined
2 yr. ago

  • https://www.uspis.gov/wp-content/uploads/2019/05/USPIS-FAQs.pdf

    Per #4 they need a warrant to open first class mail only. All other mail they can open without a warrant.

    If it’s first class and they think the contents violate federal law then they can get a warrant. I doubt many legitimate pharmacies etc. ship pills via first class, and certainly not with a bogus return address. If they saw a pattern of that I would expect a warrant wouldn’t be too difficult to get.

  • Well it’s not like you can take a commercial airliner pilot, stick him in a fighter jet, and tell him to go drop bombs. While he may need less training he’d still require a significant amount of training before he could be expected to take on even relatively safe missions and return safely. It’s not like Su-34’s etc. roll off the assembly line quickly enough to regularly use them on kamikaze missions.

  • 20+ years ago I managed the installation of a high performance compute cluster purchased from IBM. Their techs did all the initial installation and setup, right down to using their well known default password of “PASSW0RD” (with a zero for the ‘o’) for all root/admin accounts…. It took less than 20 minutes for it to be compromised by an IP address in China.

    At least other vendors like HP use random root/admin passwords printed on cards physically attached to new equipment…

  • My neighbors initially left their dog free in their house when they went out. They came home one day to find their sofa torn entirely to shreds. That dog is now always crated when they’re out.

    Proper crate training is actually a good thing, and dogs can be very comfortable with it. My wife and I have fostered dozens of greyhounds over the years, all of them having come from race tracks. When they’re raised to race they spend a lot of time in crates, including sleeping, eating, etc. They quickly realize that their crate is a safe space where they can relax, and not worry about the other dogs. All the greyhounds that we eventually adopted would practically run into a crate if we set one up, then curl up and go to sleep.

  • Exactly. See my reply in another thread where I describe a “person trap” that I used to go through to get into a secure facility. Its biometric check analyzed the geometry of your entire hand. It wasn’t just a fingerprint scanner.

  • Years ago I worked for a company whose servers were in a highly secure facility. I had to pass through a “person trap” to get in, which required three independent things to get through: something you have, something you know, and something you are.

    Imagine a booth about the size of a phone booth, with doors on both sides. To open the outer door you need a card key. Once inside the outer door closes. To open the inner door you need to put your hand on a hand scanner, then enter a PIN. Only then will the inner door unlock and let you inside. I was told that the booth also weighed you and would refuse to let you through if your weight was something like 10% different from your last pass through. That was to prevent other people from piggybacking through with you.

    Lots of people think that’s all overkill until I explain that it’s all to ensure an authorized person, and nobody else, could get through. A bad actor could steal my card key & might guess my PIN, but getting around my hand scan & weight would be extremely difficult.

    The closer we get to this sort of multi-layer authentication with websites the happier I am. I want my bank account, etc. protected just as well as that data center…

  • After driving non-stop for 200+ miles I’m more than happy to take a break for 15-30 minutes to stretch my legs, hit the bathroom, grab some food, etc. My wife and I have done precisely this on multiple road trips that we’ve taken in our EV.

  • It was pure c code that was used to print reports, and included the date in a header. Whoever wrote it miscalculated the size of the buffer for the header by one byte. When the date was the longest month & day spelled out plus a two digit day of the month then it would overflow the buffer, resulting in the program crashing.

  • I’m a 50+ year old IT guy who started out as a c/c++ programmer in the 90’s and I’m not that worried.

    The thing is, all this talk about AI isn’t very accurate. There is a huge difference in the LLM stuff that ChatGPT etc. are built on and true AI. These LLM’s are only as good as the data fed into them. The adage “garbage in, garbage out” comes to mind. Anybody that blindly relies on them is a fool. Just ask the lawyer that used ChatGPT to write a legal brief. The “AI” made up references to non-existent cases that looked and sounded legitimate, and the lawyer didn’t bother to check for accuracy. He filed the brief and it was the judge that discovered the brief was a work of fiction.

    Now I know there’s a huge difference between programming and the law, but there are still a lot of similarities here. An AI generated program is only going to be as good as the samples provided to it, and you’re probably want a human to review that code to ensure it’s truly doing what you want, at the very least.

    I also have concern that programming LLMs could be targeted by scammers and the like. Train the LLM to harvest sensitive information and obfuscate the code that does it so that it’s difficult for a human to spot the malicious code without a highly detailed analysis of the generated code. That’s another reason to want to know exactly what the LLM is trained on.