• 0 Posts
  • 22 Comments
Joined 1 year ago
cake
Cake day: November 21st, 2023

help-circle
  • Ekky@sopuli.xyz
    cake
    tomemes@lemmy.worldSemantics is divisive
    link
    fedilink
    English
    arrow-up
    21
    arrow-down
    1
    ·
    edit-2
    13 days ago

    Can’t those both be true at the same time?

    The “system” is working as intended by the rich elite/<insert antagonist>, which means that it’s fundamentally broken for the general populace, and therefore must be fixed, which is easiest done by first destroying and then rebuilding it?

    Seems like an oxymoron to me, but I’m not entirely sure of the context.



  • I’m gonna be honest: I’ve been skimping on anti malware since i moved to Linux.

    Still keeping up the common sense part about running code you don’t know and running untrusted code and weird URLs in a virtual environment (well, except for the AUR perhaps), but I only scan for malware once or twice a year, if at all.

    Actually, I just did a scan with RKHunter which came back clean except for the usual false flags, which I find mildly suspicious as one would imagine there to be some malware with all the small time programmers and script kiddies in the Linux community.

    What are you using as anti malware? Anyone knows of good methods for set-and-forget or some good GUIs for easy containment management, scanning, and whitelisting? It can’t be that ClamAV, RKHunter, and chkrootkit are the only halfway decent AVs out there.


  • Ekky@sopuli.xyz
    cake
    tolinuxmemes@lemmy.worldI'm looking at you, ubisoft
    link
    fedilink
    English
    arrow-up
    3
    ·
    2 months ago

    Huh? That’s quite interesting.

    I’ve been running a hacked-together script which uses a disembodied copy of Proton 8 (aka. copied to a portable drive, doesn’t need to have Steam installed to run) to launch my games from Itch and GoG.

    Hmm, just tried to use Proton 9.0-2 and the current experimental in my steamapps (which appears to be version 9.0-202), and it works just fine. Though, I guess Lutris’ implementations are quite a bit more advanced than my hacks (no debugging let’s goooo).

    A very simplified version of my script, for those who might be interested: pastebin.com/kbNNvzAx. Don’t forget to uncomment game_exe and set it to your executable - won’t work otherwise.

    Also, pinging @DacoTaco@lemmy.world in case of interest.


  • I guess you could also ask: “Does the pro-tier give one any options/additional functionality that the non-pro/non-donation tier doesn’t?”

    Obviously, if you have to pay for additional functionality (like settings/themes/updates) then it isn’t a simple ask for donation. Though, I’d argue to ignore trivialities such as “thank you”-emails and possibly a small visual-only token on the program that you paid/donated, as those barely count as “functionality”.


  • Ekky@sopuli.xyz
    cake
    toTechnology@lemmy.worldparts in a Renewable Energy system
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    2
    ·
    edit-2
    2 months ago

    ~~“Batteries” is a rather broad category.

    Are we talking hydroelectric batteries? Other potential or kinetic batteries? Chemical batteries (and what subcategory)? Or maybe hydrogen-based power storages?

    Since there’s a dam on the list, I’d imagine “batteries” to be electrolytic power stores or hydrogen fuel cells, but the visualization remains lazy and perhaps borderline misinformative (depending on how nit-picky you are).

    EDIT: The illustration might also use a simplified definition of a battery (to store, excluding conversion between kinds of power) instead of the different battery technologies which exist or the full definition, which could have one argue that batteries aren’t renewable by definition.

    Though, that might be reading too much into it.~~

    Actually, never mind, I’m probably too tired to go out on an adventure about the technicalities of the definition of “battery” to make any real amount of sense and not fall into edge cases.

    I also misread “energy source” as “renewable”…



  • Oh no, it’s very difficult, especially on the scale of LLMs.

    That said, we others (those of us who have any amount of respect towards ourselves, our craft, and our fellow human) have been sourcing our data carefully since way before NNs, such as asking the relevant authority for it (ex. asking the post house for images of handwritten destinations).

    Is this slow and cumbersome? Oh yes. But it delays the need for over-restrictive laws, just like with RC crafts before drones. And by extension, it allows those who could not source the material they needed through conventional means, or those small new startups with no idea what they were doing, to skim the gray border and still get a small and hopefully usable dataset.

    And now, someone had the grand idea to not only scour and scavenge the whole internet with no abandon, but also boast about it. So now everyone gets punished.

    At last: don’t get me wrong, laws are good (duh), but less restrictive or incomplete laws can be nice as long as everyone respects each other. I’m excited to see what the future brings in this regard, but I hate the idea that those who facilitated this change likely are the only ones to go free.






  • Ekky@sopuli.xyz
    cake
    toMicroblog Memes@lemmy.worldWhat.
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    4
    ·
    5 months ago

    Thank you for the explanation, though the underlying requirements for keeping a list locally appear to remain much the same, since you really only need to add a few trigger words to the “dumb, always-on” local parser (such as your top 1000 advertisers’ company or product names). After all, I’d imagine we do not require context, but only really need to know whether a word was said or not, not unlike listening for the “real” trigger word.

    This is of course only one of many ways to attack such a problem, and I do not know how they ultimately would do, assuming that they were interested in listening in on their users in the first place.

    And yes, embedded devices are slightly harder to fiddle with than using your own computer, but I’d bet that they didn’t actually take the time to make a proper gate array and instead just use some barebones Linux, which most likely means UART access!


  • Ekky@sopuli.xyz
    cake
    toMicroblog Memes@lemmy.worldWhat.
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    10
    ·
    5 months ago

    Assuming that they parse everything locally, which appears to be the case, then why would it have to send a constant stream of audio? A small list/packet of keywords of a few bytes or KB once a day would suffice for most telemetry (including ad analysis and other possible spying reasons’) needs.

    Also, one ought to be able to see the contents of the packets if they retrieve the devices’ SSL key for the session, so this should also be falsifiable.