for (const u of document.querySelectorAll('.hnuser, #me')) {
const p=4;
const c=document.createElement('canvas');
const x=c.getContext('2d');
c.width=p*7, c.height=p*7;
u.parentElement.prepend(c);
for (let s=u.innerText, r=1, i=28+s.length; i--;) {
// xorshift32
r^=r<<13, r^=r>>>17, r^=r<<5;
const X=i&3, Y=i>>2;
if (i >= 28) {
// seed state
r+=s.charCodeAt(i-28);
x.fillStyle='#'+(r>>8&0xFFFFFF)
.toString(16).padStart(0, 6);
} else {
// draw pixel
if (r>>>29 > X*X/3+Y/2)
x.fillRect(p*3+p*X, p*Y, p, p),
x.fillRect(p*3-p*X, p*Y, p, p);
}
}
}
In an age of affordable spellcheck, there was something
heraldic about his lack of it.- totetsuThe opus models seems pretty adept and extracting structured data from ocr https://www.ocrarena.ai/battle
- With llms there is a secondary training step to turn a foundational model into a chat bot. Is these something similar going on with these image generation models, that is making them all tend towards making pretty clean images and stopping them making half eaten food even if they have the capabilities?
- on a side note, I wonders if anyone submitting code to github is feeling the same way about the "duplication detection filter" type AI guardrails.
- https://docs.nginx.com/nginx/admin-guide/security-controls/t...
Like let’s say you have a proxy server like Nginx on a server with a public facing ip address and then it also has access to a private subnet where your application servers are running. A visitor to your website’s browser make a secure https connection the nginx server where https would be terminated and then it would proxy traffic in plain http over your internal private subnet to the app server. And your are in a five eyes country where your intelligence services took it on themselves to follow the nsa or fbis instructions and plug a network device into those private subnets of all the big service providers inside their datacenters that is configured in something like a promiscuous way so it receives all the packets for any device on the network. Then those packets somehow end up in a big nsa datalake.. or something along those lines
- I thought these “lawful intercept” organisations had their taps inside the data centers after https tsl to the user had already been terminated. And so the infamous ssl removed here slide from prism.
- https://element.io/en/help#encryption-device-verification
> After Alice logs in on a new device, she uses her cryptographic identity to demonstrate to Bob that the new device genuinely belongs to her, rather than being added by someone else with access to her account. She can do this either by entering her recovery key (which gives the new device immediate access to her cryptographic identity ), or by carrying out an interactive verification from an existing verified device.
- Maybe they need a secret ‘Second Rebble’, hidden within Pebble, to take over if it collapses again.
- from about 8:30 in this lecture there is a good description of the phrase "ecosystem services" https://www.abc.net.au/listen/programs/philosopherszone/envi...
- There is already ablated Deepseek models out there that will do just that.
https://huggingface.co/NaniDAO/deepseek-r1-qwen-2.5-32B-abla...
https://www.lesswrong.com/posts/jGuXSZgv6qfdhMCuJ/refusal-in...
- I get so frustrated watching people fuss around in VSCode because they're stuck in it and they've never had the opportunity to see all the intuitive and more workable tools that a.. just part of the basic OS they are using. .. like keeping their console a tab taking up 1/4 the screen and trying to read a stack-trace ..
- 11 points
- 90 points
- Zachary Stein makes the case that conferring social statuses to Artificial Intelligences is a ex-risk. https://cic.uts.edu.au/events/collective-intelligence-edu-20...
- 4 points
- 2 points
- FWIW I recently was watching something that i did not realise had been auto translated from Chinese to English. It was kind of a technical topic, but still it seemed perfectly natural. It struck me that .. as much as conflict hawks and clash of culture theorists might want to do their best to construct an enemy, if we get past the disorientation of language barriers, then mostly people are the same. If AI translation can help with that its a benefit.
- These ones? https://github.com/mozilla-japan/translation/wiki/L10N-Guide...
Looking through that wiki there seems to be a lot of things that ML would get wrong.
- So setting up windows is just like what I studied for that redhat cert now.
- wow this one looks like it would make a good birthday card layout. https://hrc.contentdm.oclc.org/digital/collection/p15878coll...