• 0 Posts
  • 34 Comments
Joined 2 years ago
cake
Cake day: June 17th, 2023

help-circle
  • While they are massively more common than in other fields, they are still a tiny minority.

    It’s also worth noting that the toupee effect may be involved. A lot of trans people can pass, in a work environment, as their preferred gender. I know a few trans people that I would never have clocked as trans, except the info came out in discussions.


  • cynar@lemmy.worldtoProgrammer Humor@programming.devAI in reality
    link
    fedilink
    English
    arrow-up
    45
    arrow-down
    1
    ·
    3 months ago

    LLMs can’t become AGIs. They have no ability to actually reason. What they can do is use predigested reasoning to fake it. It’s particularly obvious with certain classes of proble., when they fall down. I think the fact it fakes so well tells us more about human intelligence than AI.

    That being said, LLMs will likely be a critical part of a future AGI. Right now, they are a lobotomised speech centre. Different groups are already starting to tie them to other forms of AI. If we can crack building a reasoning engine, then a full AGI is possible. An LLM might even form its internal communication method, akin to our internal monologue.


  • cynar@lemmy.worldtoSelfhosted@lemmy.worldWhat access points do you use?
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    4 months ago

    The dream router is an excellent base to build upon. It provides all the normal functions (ethernet, wifi, router etc) as well as hosting the control software.

    Unifi’s real power is when you expand it. The access points make extending WiFi coverage easy. You dont even need a wired link. It will link over WiFi, either as a primary or as a fall back. The flex mini is also quite handy. It’s a little poe powered switch. I have a couple tucked away providing extra ports around the house.

    With my setup, I have detailed monitoring and control down to the port or wifi device. I can monitor and control things in detail, or get a high level view of my network.


  • While expensive, UniFi hardware is just a huge step beyond the rest of the consumer market.

    I’ve had literally 10x the range (5x vs 50m), in congested environments, compared to ‘gaming’ hardware. I actually did a side by side to test. I was shocked at the difference.

    The bridging function is also a life saver. 2 LR units can get a reliable signal between each other, at ridiculous ranges.




  • cynar@lemmy.worldtoSelfhosted@lemmy.worldServer for a boat
    link
    fedilink
    English
    arrow-up
    17
    ·
    9 months ago

    Your best bet might be to use a laptop as the basis. They are already designed with power efficiency in mind, and you won’t need an external screen and keyboard for local problem solving.

    I would also consider having a raspberry pi 3 or similar as a companion. Services that must be up all the time run on the pi (e.g. network admin). The main computer only gets kicked out of sleep mode when required. The pi 3 needs less power than the newer pis, while still having enough computing power to not lag unless pushed hard.

    I definitely agree with SSDs. HDDs don’t do well when rotated when running. Boats are less than a stable platform.




  • It’s not too bad. Relativity says that no frame of reference is special.

    • On earth, a second looks like a second, but a second on the moon looks too quick.

    • On the moon, the second looks like a second, but a second on earth looks too slow.

    Both are actually correct. The simplest solution is to declare 1 to be the base reference. In this case, the earth second. Any lunar colonies will just have to accept that their second is slightly longer than they think it should be.

    If it helps, the difference is tiny. A second is 6.5x10^-10 seconds longer. This works out to 56 microseconds per 24 hours. It won’t affect much for a long time. About the only thing affected would be a lunar GPS.



  • An encryption scheme is only as strong as its weakest link. In academic terms, only the algorithm really matters. In the real world however, implementation is as important.

    The human element is an element that has to be considered. Rubber hose cryptanalysis is a tongue and cheek way of acknowledging that. It also matters since some algorithms are better at assisting here. E.g. 1 time key Vs passwords.


  • The purpose is to access the data. This is a bypass attack, rather than a mathematical one. It helps to remember that encryption is rarely used in the abstract. It is used as part of real world security.

    There are actually methods to defend against it. The most effective is a “duress key”. This is the key you give up under duress. It will decrypt an alternative version of the file/drive, as well as potentially triggering additional safeguards. The key point is the attacker won’t know if they have the real files, and there is nothing of interest, or dummy ones.


  • I personally make use of the sonoff pow smart plugs, with Tasmota firmware. Though any Tasmota compatible smart plug with power readings will work.

    The key thing is that with Tasmota, you can properly calibrate the readings. I have a friend with a high quality power meter. I used that to calibrate my smart plugs, they seem to track within a few % of the expensive one, once calibrated.

    Depending on if you have access to an expensive meter or not, this will either be the best bet, or completely useless to you. Your local Hackspace might also be a good option for getting your hands on an expensive meter for an evening.


  • The issue is that we used to have both irc and forums. Discord has taken on the role of both in 1. Unfortunately, that means that it also needs the remote search capabilities of a forum to not screw over the community, long term.

    It’s amazing the number of times a 3+ year old discussion on either a forum, or Reddit has bailed me out of a hole. Everything like that on discord is cut off, unless you know it exists.


  • One of the funnier ones is that the matrix actually did hacking right. It was also so quick you don’t notice it.

    When Trinity hacks into the power station, it’s legit. She checks the software version, which shows an out of date version. She then uses a known flaw in that version to reset the password.

    It’s the only bit of actual hacking in the movie. They obviously knew that geeks would be checking it frame by frame, so they actually did their homework on it.