Skip Navigation

Posts
14
Comments
267
Joined
2 yr. ago

  • I wouldn't call pasting verbatim training data hallucination when it fits the prompt. It's not necessarily making stuff up.

    I feel like you're unfittingly mixing tool target behavior with technical limitations. Yes, it's not knowingly reasoning. But that doesn't change that the user interface is a prompt-style, with the goal of answering.

    I think it's fitting terminology for encompassing multiple issues of false answers.

    How would you call it? Only by their specific issues? Or would you use a general term, like "error" or "wrong"?

  • Makes you wonder how they identified them. If they know what he wrote and he was using a VPN, it's r either state prosecution receiving information from VPN provider and/or discord, them sharing personal info, or backdoors being used.

    Does discord respond to Chinese inquiries? The Twitter example with mobile phone numbers makes me think that may be the most likely identification.

    Too bad the article lacks these details.

  • she updates her github repos

    I was so confused by the link not going to GitHub. (and the Lemmy instance looks very different from mine)

  • As a society, we're responsible for all our children. The point of child protection laws, and population protection in general, is to support and protect them, because often times, parents are incapable of doing so, or it's social dynamics that most parents can't really understand, follow, or teach in.

    Yes, parents should teach and protect their children. But we should also create an environment where that is possible, and where children of less fortunate and of less able parents are not victims of their environment.

    I don't think demanding and requiring big social platforms to moderate and regulate at least to the degree where children are not regularly exposed to life-threatening trends is a bad idea.

    That stuff can still be elsewhere if you want it. But social platforms have a social dynamic, more so than an informative one.

  • Microsoft maintains a modern fork of Mono runtime in the dotnet/runtime repo and has been progressively moving workloads to that fork. That work is now complete, and we recommend that active Mono users and maintainers of Mono-based app frameworks migrate to .NET which includes work from this fork.

    What's left for the mono project then? What's Wine's interest in it?

  • it's not hard to find them when they're selling fake reviews as a service

    The article teaser beginning should make that clear as well

    Amazon sued more than 10,000 Facebook group administrators in July 2022

  • labeled “BREAKING,” that was posted in late January, three weeks after an earthquake had struck.

    Labeled broken because it's a broken notification [system] /s

  • we could see other PSU makers follow suit in switching to Cybenetics

    It would certainly be great if all did. But I doubt that will be the case.

    Only the best have an interest in switching.

    But maybe that's good enough for now. The PSU market has a good number of alternative manufacturers, and those that care will drive demand for this information. Maybe those targeting the enthusiast market won't be able to get around providing it.

  • Its still the same extension, same source code, same logic, just less capable

    the same… but not the same… ??

    I think the technologies are quite different.

    uBOL is entirely declarative, meaning there is no need for a permanent uBOL process for the filtering to occur, and CSS/JS injection-based content filtering is performed reliably by the browser itself rather than by the extension. This means that uBOL itself does not consume CPU/memory resources while content blocking is ongoing -- uBOL's service worker process is required only when you interact with the popup panel or the option pages.

    Are you claiming non-lite does the same, plus more?

    You say it's the same source code, but it's a different source code repository. non-lite, lite.

  • It also comes first in the alphabet.

  • They wrote in the article that it rose. That was part of what they wrote about.

    I don't see your point.

  • the most relevant:

    To take advantage of the vulnerability, a hacker has to already possess access to a computer's kernel, the core of its operating system.

    For systems with certain faulty configurations in how a computer maker implemented AMD's security feature known as Platform Secure Boot—which the researchers warn encompasses the large majority of the systems they tested—a malware infection installed via Sinkclose could be harder yet to detect or remediate, they say, surviving even a reinstallation of the operating system.

    For users seeking to protect themselves, Nissim and Okupski say that for Windows machines—likely the vast majority of affected systems—they expect patches for Sinkclose to be integrated into updates shared by computer makers with Microsoft, who will roll them into future operating system updates.

  • notably

    Windows is not impacted by this issue.

    quoting the main, critical part:

    1. Under public domain (.com), the browser sent the request to 0.0.0.0.
    2. The dummy server is listening on 127.0.0.1 (only on the loopback interface, not on all network interfaces).
    3. The server on localhost receives the request, processes it, and sends the response.
    4. The browser blocks the response content from propagating to Javascript due to CORS.

    This means public websites can access any open port on your host, without the ability to see the response.

  • How does it determine better results? oO

    That's the problem with most marketing. Unspecific, raising questions rather than answering them. Being vague and only positive-formulated rather than presenting information.

  • "snubs"?

    I have no problem idea what that means. Even with the context.

  • What they’re doing now isn’t responsible.

    Would it be responsible if every response would start with "I lie x % of the time but here's my response:"?

  • It's not the same kind of stealing as stealing an apple or meal. Those remove the product, the material in its entirety.

    The only devaluation washing does is in wear. And even less directly in the initial investment not being paid back upon use.

    That's concerns outside of morals of course. But stealing products isnt equateable to stealing usage.