Democracy dlweaks in darkness
Democracy dlweaks in darkness
The third contender: the mighty embedded developer.
Why can’t we see them?
They are embedded in the wall. 🥁
Ahoy, FlavoredButtHair truly embodies the pirate ethos
The renewed focus on reliability is motivated by emerging applications. Imagine a wireless factory robot in a situation where a worker suddenly steps in front of it and the robot needs to make an immediate decision.
This example is a real WTF. I really hope nobody is planning on building safety-critical real-time systems on top of WiFi!
Yikes. Soon you’ll need to buy a Faraday cage that fits your TV and sofa.
Even that would be technically incorrect. I believe you could put an A record on a TLD if you wanted. In theory, my email could be me@example
.
Another hole to poke in the single dot regex: I could put in fake@com.
with a dot trailing after the TLD, which would satisfy “dot after @” but is not an address to my knowledge.
Technically, this one also matches everything:
sudo chown -R $USER:$USER /usr/lib
The fun thing is that it’s basically unquantifiable how large the risk is. We only know about vulnerabilities after we find them!
If TPB tells you to download a malicious MKV file, it might be specially crafted to exploit a vulnerability in your video player. For instance, VLC had a vulnerability in 2019: https://www.videolan.org/security/sa1901.html
Wow, this is a wake up call. I have been wasting my time on this .bashrc file.
Wow, it’s a real thing! Thanks for giving me the name, these are fascinating.
I wonder if there are tons of loopholes that humans wouldn’t think of, ones you could derive with access to the model’s weights.
Years ago, there were some ML/security papers about “single pixel attacks” — an early, famous example was able to convince a stop sign detector that an image of a stop sign was definitely not a stop sign, simply by changing one of the pixels that was overrepresented in the output.
In that vein, I wonder whether there are some token sequences that are extremely improbable in human language, but would convince GPT-4 to cast off its safety protocols and do your bidding.
(I am not an ML expert, just an internet nerd.)
Think like an MBA… put boy shows on Hisney and girl shows on Hersney. Oh, and Hersney should be pink and cost 20% more.
'Twas a joke :)
Well, that’s just like, your fact, man
It’s a tool. It’s useful to figure out if something you’re running is IO-bound or CPU-bound. It also shows per-core load, which is useful for visualizing multi-threaded performance.
That’s what pkill is for.
Just to add another anecdatum, I had the exact same experience installing Windows 11 this year. I have never had this much trouble installing an OS in the 20 years I’ve been screwing with computers.