Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)UF
Posts
1
Comments
286
Joined
2 yr. ago

  • Only glanced through the paper on mutable value semantics (MVS). Which appears to be the differentiator of this from Rust.

    The claim is that MVS enables mutable operations safely without the complexity of Rust - but still high performance.

    "Mutable value semantics (MVS) sits at third point in the design space where both goals are satisfied and mutation is supported, without the complexity inherent to flow-sensitive type systems. The key to this balance is simple: MVS does not surface references as a first-class concept in the programming model. As such, they can neither be assigned to a variable nor stored in object fields, and all values form disjoint topological trees rooted in the program’s variables"

  • Going out on a limb and betting China or Russia gangs are responsible. Happy to be priced won't but... Yea. Not holding my breath.

    Every web service provider should block all China and Russia IPs until they agree to behave like responsible parties. AWS's WAF has pretty good geo IP blocking.

  • They are likely using a form of https://en.wikipedia.org/wiki/Perceptual_hashing

    The noise level a perceptual hash is sensitive to can be tuned.

    The "falsely match similar looking" is harder than one would expect. I used to work on an audio fingerprinting system which was extremely robust to "similar" audio matching. What sounded similar to us was always identified uniquely by the hash with high confidence.

    For example. Take the same piano piece done by the same artists on the same piano performed as close as they could to the same: never confused the perceptual hash with ~10 sec of audio. Not once. We could even identify how much of a pre-recorded song was used in a "live" performance.

    There are adversarial attacks for perceptual hashes. However, "similar eyes" would not be one to a standard perceptual hash. More like: a picture of an abstract puppy happens to have the same hash as an eye.

    I'd be curious on the details of the hash. That is necessary to know what the adversely attacks are. But I see no mention of the details. Which is suspicious on it's own.

  • Not mine boggling imo when you think of it from the angle of "then they'll have to spend more money!"

    Otoh I had an argument with an AWS rep who just didn't understand why I wanted an isolated local dev environment.

  • Anybody from the "law and order" party want to defend this shit head?

    "charges Trump, De Oliveira and Nauta with two new obstruction counts based on allegations that they instructed an unnamed, fourth worker to delete surveillance video footage at Trump's Mar-a-Lago residence last summer "to prevent the footage from being provided to a federal grand jury." "

    Go on. Let's here the bullshit excuses