Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)DR
Posts
13
Comments
766
Joined
4 yr. ago

  • I personally use 1 euro per month VPS (VAT included - for those not subject to it, that's less than one euro per month!) with a public IPv4 address and (often) a /64 IPv6 block, ensuring full reachability across the entire network. I'm not providing direct links as I have no affiliations, but netcup's "piko" VPS are among the types I use most often

  • Signal explicitly doesn’t allow its files to be uploaded to iCloud. You practically will be fine using it on iOS. Unless you are in China which has its own iCloud/Apple servers, or the UK where Apple disabled advanced data protection.

    What difference does ADP make if your Signal chats are never stored in iCloud? Are they stored in cloud backups?

  • 300ms refers to the window of time that the vulnerable DLL has elevated privileges and therefore the window that an attacker has to exploit it.

    It doesn’t mean that the whole compromise from the start of an exploit chain takes 300ms. Badly written (clickbait) headline.

  • So imagine the language model can produce grammatically correct and semantically meaningful dolphin language, how does it translate that to a human language?

    The reason LLMs can do this for human languages is that we have an enormous corpus of Rosetta stones for every language that allow the model to correlate concepts in each language. The training data for human to dolphin is going to be just these “behavioural notes.”

    So the outcome is that the bullshitting machine will bullshit the scientists that it knows what they’re saying when it’s actually just making stuff up.

    It’s a big problem with LLMs that they very rarely answer, “I don’t know.”

  • would like to be able to test PRs from others without putting my machine at risk

    I know what you mean, but do you not read the diff? Are you working on codebases that are so obfuscated that you can't spot a malicious command?