Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)C
Posts
11
Comments
185
Joined
1 yr. ago

  • Two famous nerve taps that are both painless and liable to render someone cooperative:

    • the head
    • the prostate

    I think they drew the wrong kind of head?

  • Everyone Nokia user knows that Space Impact was a better game than Snake

  • Office parks in the middle of nowhere suck. You're never going to be close to everyone, employees can't walk somewhere for a change of scenery or to take a break, and being away from downtown means public transit is less likely to reach the area.

    I'm all for letting people pick a coworking space if they want, but making people commute to the suburbs is a different kind of hell.

  • Given that it was an internal DNC vote... they didn't

  • I read somewhere that this is basically Max Brooks' take on the film.

    Something about breathing a sigh of relief when he read the script, because it was such a distinct story that there was nothing left of his book to be butchered.

  • OK, you have a point on Godzilla, that machine is pretty fun. I also enjoyed playing John Wick despite my prejudice.

  • AI doesn't make things up: It "believes" (doesn't actually have belief) a real thing just as much as a false thing. The two are indistinguishable to LLMs because the only "true" thing for a chatbot is the existence of text and tokens. Everything else is meaningless to the math.

    Does my sewer pipe have imagination because is spewed black goop across my kitchen instead of carrying my waste water away like it normally does? Is my TV hallucinating a new show because the screen got damaged at the factory? Did a printing press create art when it smudged the text on my paperback?

    LLMs are tools with a high defect rate which tech billionaires and the media branded as hallucintation to sound more impressive.

  • Yeah. Stern is one of the few companies making new tables, and the stuff they produce these days is all about making an account and tracking your games with QR codes. They even have a few where there is a kind of meta-game that you play across multiple rounds. Not really my thing.

    A friend of mine got a summer job working a pinball joint, so I've learned to appreciate the game a lot more recently. Helps to have an inside person giving me free plays.

  • As long as there's one machine that's not Sternslop

  • I see this article more about reporting unfortunate news rather than boosting fear. The news seems to be "Car manufacturers don't take security seriously and people are exploiting it with a simple tool".

    I'd rather hear about this now than wake up one day to see that my flipper is illegal because some politician watched a tiktok video.

  • Is there a nuance to usage of the word hierarchy that I'm not understanding in this context?

    Like if I invite a bunch of friends over to help me move into a new apartment, is there a hierarchy because I'm telling everyone where to put the boxes? If my pal Sarah drives a truck for work, so I entrust her to load the van with two other people, is that a hierarchy?

    I'm not asking this to be a smartass, I'd just like to understand if there is a meaningful difference between hierarchy and deferring to someone's skill in a particular domain.

  • Me and my 300 clones spider-crawling over the seats to deplane.

  • There are some sites where Anubis won't let me through. Like, I just get immediately bounced.

    So RIP dwarf fortress forums. I liked you.

  • At the simplest level: An encryption algorithm doesn't concern itself with whether or not the right key was provided*. It takes a key, some encrypted data, and then spits out whethever the math says it should.

    Programmers will build on top of an algorithm to add more complex security features. An example of which might be "Tell the user whether or not their key actually worked" or "Tell the user if someone tampered with the encrypted data".

    The actual implementation of these security features is different for every situation, and can get quite complex.

    Here is a very simple example of what someone might do:

    1. Take the data that someone wants to encrypt eg "hello world"
    2. Put a known constant value at the beginning of the data eg using the constant "sentinel" with "hello world" becomes "sentinelhello world"
    3. Encrypt everything together

    Then when decrypting, you look for the word "sentinel" at the beginning, and then spit back everything after that. If the word "sentinel" isn't the first thing you see, then you know the key is incorrect.

    In the case of AES algorithm, it has a special way of padding the plaintext before encrypting. If the padding doesn't show up after decrypting, then the key is incorrect.

    A general statement, not necessarily representative of common encryption algorithms

  • Better than a barrel to the spine

  • Hmm, you gave me an idea to stick chewing gum inside hats like that if I ever see them. Chances are low that the sabotage would be noticed until someone tries it on, and I won't lose sleep over anyone who wears it and gets gum in their hair.

  • I assume that "AI" in this context is a thermostat which keeps the fermenting tanks at the right temperature?

  • Yes! Thanks