Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)A
Posts
2
Comments
131
Joined
3 yr. ago

  • It likely depends on the courthouse, but generally speaking you'll show up, sign in, someone will give a little talk about how things work, and then you'll wait in a waiting room for a few hours while various names are called. Then you'll go into the court room and the actual jurors will get selected from the pool. They'll ask some questions and depending on the answer some people will get removed (having a family member who's a police officer is pretty common).

    If you're not selected, you'll probably go back to the waiting room to see if you get pulled for another case. If you are, you'll sit and listen to the details of the case and eventually make a determination. Depending on the case/jurisdiction, you might also be a "backup juror" where you'll sit through the entirety of the case, but won't actually be part of the deliberation at the end unless another juror had to drop out for some reason.

    I ended up getting a murder trial, which was pretty interesting. Overall wasn't a horrible experience, but definitely glad I brought a Steam Deck while I was waiting.

  • That implies management is held accountable

  • Just curious, why aren't you vegan if you consider it morally bankrupt to be complicit in the meat industry?

  • Bear in mind, with this liberal interpretation, any time you access a website, that is also consuming someone's labor and if you don't have a subscription to it, it is unpaid.

  • Ah, gotcha, I was thinking more in terms of software attacks than hardware, and that some vulnerability would come up at some point for them to get root access, at which point I think they'd be able to get the key one way or another. I'd imagine it also depends on how locked down the system can be based on the nature of their duties; arbitrary internet access makes shipping it off somewhere a bit easier. Another consideration would be that the drive could also be imaged, and if the key were ever recovered at a later date through whatever method/mistake/etc. the entirety of the data could be recovered.

    But, yeah, definitely agree that that's all moving well outside the bounds of disgruntled/opportunistic employee and more into the persistent adversary realm.

  • Fundamentally, once someone has some of the data, they have that data, and you can make no guarantees to remove it. The main question you need to ask is whether or not you're okay with limiting it to the data they've already seen, and what level of technical expertise they need to have to keep the data.

    Making some assumptions for what's acceptable as a possibility, and how much you want to invest, I'd recommend having the data on a network-mapped share, and put a daily enforced quota for their access to it. Any data they accessed (presumably as part of their normal duties) is their's, and is "gone." But if you remove their access, they can't get any new data they didn't touch before, and if they were to try and hoover up all the data at some point to copy it off, they'd hit their quota and lose access for a bit (and potentially send you an alert as well). This wouldn't prevent them from slowly sucking out the data day after day.

    If they only need to touch a small fraction of the customer data, and particularly if the sensitivity of the data goes down over time (data from a year ago is less sensitive than data from a day ago) this might be a decent solution. If they need to touch a large portion of the data, this isn't as useful.

    Edit: another nice bit is that you could log on the network share (at your location) which of the customer data they're accessing and when. If you ever want to audit, and see them accessing things they don't need, you can take action.

    I think the next best solution is the VDI one, where you run a compute at your location, and they have to remote into it. If they screen capture, they'll still save off whatever data they access, and if they have poor, or inconsistent, connection up your network it'll affect their ability to do their job (and depending how far away they are it might just be super annoying dealing with the lag). On top of that, it's dependent on how locked-down they need to be to do their job. If they need general Internet access, they could always attempt to upload the data somewhere else for them to pull it. If your corporate network has monitoring to catch that, you might be okay, but otherwise I think it's a lot of downside with a fairly easy way to circumvent.

  • I'm not the most up to speed on TPM's, but does it have the capability to directly do network access in order to pull the key? Otherwise, you're going to need the regular OS to get it to the TPM somehow, in which case that's the weak link to pull the key instead of ripping it from the TPM itself.

    And once they have the key once, how do you enforce them having to re-request it? Is there a reason that that point they couldn't just unplug from the Internet (if even necessary) and copy the entirety of that drive/partition somewhere else?

  • I'm continually shocked by how often I learn of some structural systemic issue, pull the thread to see where it started and- oh, surprise, it was once again Reagan.

  • Ducks

    Jump
  • And corkscrew genitals

  • One note on "sick" being slang for "good": that particular slang started in the 80s, and some of the younger generation consider it to be old person slang.

  • I'd say it's not just misleading but incorrect if it says "integer" but it's actually floats.

  • Also made the switch not too long ago, only using Manjaro. Steam's proton had gotten extremely good at playing Windows games, so there's a good chance that it could run your old strategy game.

    You might already have this on your set-up, but having wine auto-launch for Windows executables has been fantastic. I regularly pull and run Windows executables without really giving it a second thought, and so far it's generally "just worked."

  • 🫡

  • I think it's used more often in computer science, but the difference between contiguous and continuous. Continuous means "without end" and contiguous means "without break."

  • Gas-filler. There's a couple states in the US where you aren't allowed to pump your own gas, someone else has to do it for you, and you're expected to then tip them.

    The job is essentially getting me to pay to be inconvenienced. I'd prefer to pay to let me pump my own gas.

  • Exclusives are anti consumer

  • I think to some extent it's a matter of scale, though. If I advertise something as a calculator capable of doing all math, and it can only do one problem, it is so drastically far away from its intended purpose that the meaning kinda breaks down. I don't think it would be wrong to say "it malfunctions in 99.999999% of use cases" but it would be easier to say that it just doesn't work.

    Continuing (and torturing) that analogy, if we did the disgusting work of precomputing all 2 number math problems for integers from -1,000,000 to 1,000,000 and I think you could say you had a (really shitty and slow) calculator, which "malfunctions" for numbers outside that range if you don't specify the limitation ahead of time. Not crazy different from software which has issues with max_int or small buffers.

    If it were the case that there had only been one case of a hallucination with LLMs, I think we could pretty safely call that a malfunction (and we wouldn't be having this conversation). If it happens 0.000001% of the time, I think we could still call it a malfunction and that it performs better than a lot of software. 99.999% of the time, it'd be better to say that it just doesn't work. I don't think there is, or even needs to be, some unified understanding of where the line is between them.

    Really my point is there are enough things to criticize about LLMs and people's use of them, this seems like a really silly one to try and push.

  • We're talking about the meaning of "malfunction" here, we don't need to overthink it and construct a rigorous proof or anything. The creator of the thing can decide what the thing they're creating is supposed to do. You can say

    hey, it did X, was that supposed to happen?

    no, it was not supposed to do that, that's a malfunction.

    We don't need to go to

    Actually you never sufficiently defined its function to cover all cases in an objective manner, so ACTUALLY it's not a malfunction!

    Whatever, it still wasn't supposed to do that