• 6 Posts
  • 73 Comments
Joined 1 year ago
cake
Cake day: June 14th, 2023

help-circle

  • (please attend to primaries next time…)

    So… should I have voted for Marianne Williamson or Dean Phillips, keeping in mind Dean Phillips formally withdrew from the race before my state’s primary, and Marianne Williamson couldn’t have won if she had sweeped every state after and including mine?

    I think the problem is mostly that the US system of elections is turbo mega fucked.





  • I spent an hour and a half arguing with my brother about probability, because he asked ChatGPT what the probability that he and his daughter were born on the same day.

    ChatGPT said 1/113465 which it claimed was 1/365^2 (this value is actually 1/133225) because there’s a 1/365 chance he was born on such and such day, and a 1/365 chance his daughter was too.

    But anyone with even a rudimentary understanding of probability would know that it’s just 1/365, because it doesn’t actually matter on which day they both happened to be born.

    He wanted to feel special, and ChatGPT confirmed his biases hard, and I got to be the dickhead and say it is special, but it’s 1/400 special not 1/100000. I don’t believe he’s completely forgiven me over disillusioning him.

    So yeah, I’ve had a minor family falling out over ChatGPT hallucinations.








  • Well, the problem is you don’t know what you don’t know. One of the first example tasks in the paper was regarding implementing a symmetric cipher. Using a weak cipher was recommended by AI tools sometimes, these developers didn’t know that some ciphers were weak. Additionally, even when the AI tool recommended a strong cipher, such as AES, it generated code that screwed up an implementation detail (failing to return the authentication tag), making the result insecure. And the user didn’t know it was wrong because they didn’t know it was incomplete.

    There’s no substitution for domain specific knowledge. Users who were forced to use traditional tools got the answer correct significantly more often because they had to read, process, and understand the documentation for the libraries, which meant they understood why the symmetric cipher was the way it is, and what additional information needed to be reported and why.





  • So please forgive me if this is a rather naive question. I haven’t seriously used Windows in nearly 15 years.

    I seem to recall runas being a lot like su, in that you enter the target user’s credentials, rather than your own as in sudo. This works because sudo is a setuid executable, and reads from configuration to find out what you’re allowed to do as the switched user.

    Is the behavior of windows sudo like unix su or unix sudo with regard to the credentials you enter? Can you limit the user to only certain commands?





  • OmnipotentEntity@beehaw.orgtoMemes@lemmy.mlvery upsetting
    link
    fedilink
    arrow-up
    7
    arrow-down
    1
    ·
    5 months ago

    If this is what it takes to get copyright reform, just granting tech companies unlimited power to hoover up whatever they want and put it in their models, it’s not going to be the egalitarian sort of copyright reform that we need. Instead, we will just getting a carve out just for this, which is ridiculous.

    There are small creators who do need at least some sort of copyright control, because ultimately people should be paid for the work they do. Artists who work on commission are the people in the direct firing line of generative AI, both in commissions and in their day jobs. This will harm them more than any particular company. I don’t think models will suffer if they can only include works in the public domain, if the public domain starts in 2003, but that’s not the kind of copyright protection that Amazon, Google, Facebook, etc. want, and that’s not what they’re going to ask for.



  • Because the nix package manager places all system packages under /nix/store/uniquehash-packagename-version/

    Where the unique hash is obtained via a Merkel tree of all the inputs. So in particular, binaries and libraries exist underneath those directories, not in the places you would expect from FHS.

    In order to make the system actually work, environment variables are set up and executables are patched to refer to specific paths within the Nix Store.