Preferences

AstralStorm
Joined 5,852 karma

  1. It will be challenged in the Tribunal if it passes, and will lose as it is incompatible with baseline EU laws.

    Specifically, the charter: https://eur-lex.europa.eu/eli/treaty/char_2012/oj/eng

    Article 8 point 2. They're missing the provisions of data retrieval. If available, that would immediately take down the whole monitoring system as a full message history request would have to be available since they don't know which data is private or personally identifying.

    Additionally, this falls under GDPR legitimate concern category so must be possible to reject by the user. Otherwise it's an involuntary measure making the law contradictory.

    With this in mind, it's toothless if corrected.

  2. If you haven't started doing the thing while researching it, you're doing archeology or historiography, not research. (Different scientific fields. Research requires experiment.)
  3. It's called documentation. Somehow people forget to include a non-external service dependent version with their code these days.

    Probably because "nobody is paid for doing that".

  4. Yeah sure. The tricky part is if you even know which action to take. To actually do that you need to research enough, conceptualize the end goal and envison a rough but workable plan.

    Most people don't and blindly stumble going after short term to mid term reward. Then later life crashes them hard, except for the lucky few.

    And the truth is, now some people have many more luck coupons to spend than others.

  5. Who's paying to school them at googling? Certainly not you...
  6. Unless you wasted years by going in the wrong direction which could have been avoided by a week of serious thinking and planning... (Or even a year. Some mistakes are extremely costly.)
  7. It's even more legally funny than this. They are also allowed to enact entrapment to some degree and it passed court muster in the US. That because it's extremely hard to use it as a defence.

    Note that these actions are illegal in most continental jurisdictions as stings must be devised ahead of time against specific groups of people. There's also Article 6 of ECHR.

    In other words, FBI cannot run a sting off an EU site like this, at least definitely not a German one.

  8. How can you even sue without any legal identity? This website and an organisation does not happen to have any. Might as well be some shell company in the Carribeans with no legal standing in France. It's not even good enough for public prosecution, as the tip would then go through French services.

    This law is completely backwards, and worse than a SLAPP. If you cannot respond to a report in any way, it should be null.

  9. The store owner visibly responds to the customers differently. Fingerprinting is invisible. It's more like the store owner recording everyone on hidden camera.

    So no, you cannot steelman a broken analogy.

  10. It's not even that. Only a kernel of the LLM is trained using RLHF. The rest is self-trained from corpus with a few test questions added into the mix.

    Because it still cannot reason about veracity of sources, much less empirically try things out, the algorithm has no idea what makes for correctness...

    It does not even understand fiction. Tends to return sci-fi answers every now and then to technical questions.

  11. Still waiting for someone to make a tiny token sized phone. Unfortunately the smallest around, Unihertz Atom, is both outdated and too low resolution for some apps to work.
  12. Now that is more of a problem than a bank. Which is why someone beeds to integrate OTP tokens into ID cards, closing the issue.
  13. Uh, banks still provide separate tokens and one time pad cards last I've heard.

    If yours doesn't, pick one that does.

  14. Warrant canary depends on agreed upon inaction, which shields it somewhat. You cannot exactly compel speech by a gag order.

    This, being an active process, if found out, is violating a gag order by direct action.

  15. TPM itself is a simple data container with slow encryption/decryption capabilities. It cannot hide anything really.

    You might have mistaken it for say Intel ME and the AMD equivalent.

  16. No, these should exist in the TPM and highly volatile memory like CPU cache. This including the decryption code. This can be achieved using mechanisms similar to what Coreboot does before RAM is initialized.

    No need for the keys or decryption to touch easily intercepted and rowhammered RAM.

  17. Don't worry, you're going to be searching for logic vs requirements mismatches instead if the thing provides proofs.

    That means, you have to understand if it is even proving the properties you require for the software to work.

    It's very easy to write a proof akin to a test that does not test anything useful...

  18. You might have just filtered off all the nutrients and have yourself a dietary deficiency. Oops.

    And your supplements might well be contaminated...

  19. Thing is, because the whole design is closed as well as firmware, the security of it is near zero, even for sealing firmware device images (e.g. option ROM), much less bootloaders. Multiple security holes have been found.

    There's no issue booting a boot rootkit with the standard Windows bootloader unless you manually seal the image with command line or group policy, and even then it's possible to bypass by installing a fresh bootloader because the images are identical and will boot after a wipe.

  20. Yeah right. Because building a freezer that goes to -30 C is as cheap as going to -18 C. It's much beefier hardware with a lot more insulation.

    Likewise a heat pump can only boost so much.

    This, like other environment related changes never happen by market forces. Not once. And small tweaks even on large scale produce small effects, insufficient for our needs.

This user hasn’t submitted anything.

Keyboard Shortcuts

Story Lists

j
Next story
k
Previous story
Shift+j
Last story
Shift+k
First story
o Enter
Go to story URL
c
Go to comments
u
Go to author

Navigation

Shift+t
Go to top stories
Shift+n
Go to new stories
Shift+b
Go to best stories
Shift+a
Go to Ask HN
Shift+s
Go to Show HN

Miscellaneous

?
Show this modal