Forgot your password?
typodupeerror

Comment Great so where's the meat (Score 1) 114

This is great! Mythos = lots of eyeballs. Now tell us how many of each severity level were found, how many of those could be fixed automatically, and how many fixes both auto and manual then were found to introduce a vulnerability upon reanalysis. Though if there was even one critical severity bug found out of 271 that makes it worth it.

Comment Re: We just dumped Cursor (Score 1) 55

Just wondering why not just build the data centers somewhere really cold? Antarctica has got to be easier than working in space.. at least you can get there without a rocket, and you can dig underground. I am not sure I understand the economic argument for space-based data centers as opposed to ground-based data centers. Space might have more solar flux than the poles but has anyone actually compared the costs?

Comment Re:But what do they do? (Score 1) 2

Ok, to clarify a few things:

Current designs I've put up:

1. A modernised version of the DeHavilland DH98 and Merlin engine, where I basically fed ChatGPT and Claude with all of the known historic faults and some potential solutions to various problems, then let them run wild, feeding off each other to fix, refine, and clarify the various design. The premise here is that we're using known designs with known properties, changing only materials but doing so carefully so as to ensure that the balance is unchanged from the historic design. The aircraft is probably the least interesting part, as it would be very hard to make that safe, but a fully modernised Merlin that starts where Rolls Royce left off is something that could be built with minimal risk and could be quite interesting in its own right.

2. A High Dynamic Range microphone. This basically riffs off assorted physics technologies for measurement and the basic idea in many HDR schemes that you can split an input into the fine detail (essentially an equivalent of a mantissa) and a magnitude (essentially an exponent), producing a design that aught to permit (if it works) the same microphone with no adjustments handling everything from a nearby whisper to the roar of a jet engine -- but with all of the fine detail still captured from that engine.

3. An electric guitar that operates not by magnetic pickups but by accurate mapping of string behaviour in two dimensions via lasers, where this is then turned into an accurate representation of the sound in an external device. So it's not a synth guitar in the classic sense, it's actually modelling the waveform for each string in two dimensions precisely. The reason for doing 2D modelling is that this has the potential for novel behaviours but without an obligation for it to do so.

4. A synthesiser/wave processor that looks at everything that they knew how to do, and allows you to link it together arbitrarily. It is designed in two forms. The first is engineered to match the components, materials, and knowledge available in 1964, so it is something they could have built if sufficiently insane. The second is a modernised extrapolation of that, using modern digital electronics, where I can show that the modern version is a strict superset of any existing DAW, simply because I started with none of the assumptions and metaphors around which DAWs were subsequently designed.

5. Multiband camera. An attempt to build a digital camera that is far smaller and more compact than a 3CCD camera, but (like the 3CCD design) produces a far better picture than a conventional digital camera, where I don't stop at three frequencies but support many, albeit with the limitation that the time required for a photograph is abysmal.

Each design I've put up has a detailed hardware specification (including wiring where appropriate), validation/verification documents, and testing procedures. Software is defined by means of formal software contracts and occasionally Z-like forms. The designs are extremely detailed, although not quite at the level you could build them right there and then. However, the synthesiser is described right down to the level of individual transistors, diodes, and connectors, and the Merlin engine specifies precise materials, expected temperature ranges, material interactions (and how they're mitigated), and other such information.

Again, it's precise but not quite at the point where an engineer would feed comfortable feeding the specifications into an AI, having it order the bits online, and be sure of building something that works, but it's intended to be close enough that (provided the AIs actually did what they were supposed to) that an engineer would feel very comfortable taking the design and polishing it to working level.

If, however, an engineer looking at these designs comes to the conclusion that the AIs were utterly deluded, then obviously they can't handle something as simple as selecting candidate items from ranged data.

Submission + - Mozilla Firefox uses AI to hunt bugs and suddenly zero days do not feel so untou (nerds.xyz)

BrianFagioli writes: Mozilla says it used an AI model from Anthropic to comb through Firefoxâ(TM)s code, and the results were hard to ignore. In Firefox 150, the team fixed 271 vulnerabilities identified during this effort, a number that would have been unthinkable not long ago. Instead of relying only on fuzzing or human review, the AI was able to reason through code and surface issues that typically require highly specialized expertise.

The bigger implication is less about one release and more about where this is heading. Security has long favored attackers, since they only need to find a single flaw while defenders have to protect everything. If AI can scale vulnerability discovery for defenders, that dynamic could start to shift. It does not mean zero days disappear overnight, but it suggests a future where bugs are found and fixed faster than attackers can weaponize them.

User Journal

Journal Journal: Inventions to stress-test AI 2

I have been using AI to see if I could invent non-trivial stuff through recycling existing ideas (because AI is bad at actually creating new things). I've been reluctant to post this in my journal, as I dislike self-promotion, but there's so much discussion on AI and whether it is useful, that this isn't really a matter of self-promotion, but rather evidence in the debate on AI as to whether you can actually do anything useful with it.

https://gitlab.com/wanderingnerd50

Comment This sounds like a bad idea (Score 4, Interesting) 41

This is really creepy / nauseating to me, and also creates a high value target at World. You can reset leaked passwords, but you cannot reset your retina. If you choose to believe 100% in this service and willfully ignore implementing patterns to combat social engineering this could end up worse. From what I can gather (from Gemini), deepfakes take advantage of organizational social pressure, like a CEO demanding something instantaneously, or hackers being inside your email system for a long time. Perhaps this could be short-circuited by an organization actually requiring people to always call back officials on a secure phone number, confirm with shared personal knowledge, and never respond to a demand without out of band verification. I also wonder what if Zoom just calls the participants in such high-stakes meetings, instead of allowing participants to click on a link they trust because someone emailed it to them. Then the corporate security office can just verify the Zoom server. And iPhone/Macbook already have biometric sensors too but have Secure Enclave.. yes there is a big value in being able to identify someone for sure but putting it all in a single company's hands sounds like waiting for them to be attacked.

Comment Re:A serious question (Score 1) 41

It's a good question and one I'm working on trying to get an answer to. By giving AI hard, complex engineering problems, and then getting engineers to look at the output to determine if that output is meaningful or just expensive gibberish.

By doing this, I'm trying to feel around the edges of what AI could reasonably be used for. The trivial engineering problems usually given to it are problems that can usually be solved by people in a similar length of time. I believe the typical savings from AI use are in the order of 15% or less, which is great if you're a gecko involved in car insurance, but not so good if you're a business.

If the really hard problems aren't solvable by AI at all (it's all just gibberish) then you can never improve on that figure. It's as good as it is going to get.

I've open sourced what AIs have come up with so far, if you want to take a look. Because that is what is going to tell you if good can come out of AI or not.

Comment Re:Employee conversation in work environment (Score 1, Interesting) 41

The conversations are not private, but PII laws nonetheless still apply. Anything in the messages that violates PII privacy laws is forbidden regardless of company policy. Policy cannot overrule the law.

Now, in the US, where privacy is a fiction and where double-dealing is not only perfectly acceptable but a part of workplace culture, that isn't too much of an issue. The laws exist on paper but have no real existence in practice.

However, business these days is international and American corps tend to forget that. Any conversation involving European computers (even if all employers and employees are in the US) falls under the GDPR and is under the aspices of the European courts and the ECHR, not the US legal system. And cloud servers are often in Ireland. Guess what. That means any conversation that takes place physically on those computers in Ireland plays by European rules, even if the virtual conversation was in the US.

This was settled by the courts a LONG time ago. If you carry out unlawful activities on a computer in a foreign country, you are subject to the laws of that country.

Comment Re:who are they kidding? (Score 1) 57

I used to have a workstation that had a sliding cover for the camera. Maybe it was an SGI Indy? I forget. I think only some linux laptops have hardware covers / kill switches for camera and mic? I would *really* like such for MacBook Pro, how about a physical low-profile sideways cover / toggle switch that disables camera and mic together? As for biometrics, I was always against it. But then.. iPhone Face ID, so useful. And kind of necessary with the default settings though maybe we should just keep them unlocked for longer? And then the Macbook's finger print scanner button. Actually super useful. Mainly to get around system password prompts. And local keychain fine. But then I tried Google's passkey. Also quite useful though scary, it seems to use a passkey Apple hands out if your fingerprint works. The only thing is, if your fingerprint ever is allowed one day leave your machine (probably it has already) then your biometrics are in somebody's cloud, and in a year or two someone could deepfake it. That's the obvious part. Retinas? Don't get me started. I'm guessing it probably will be robust even after laser surgery.

Comment Not interesting yet. (Score 4, Informative) 49

It's possible that cetaceans have a true language. They certainly have something that seems to function the same as a "hello, I am (name)", where the name part differs between all cetaceans but the surrounding clicks are identical. The response clicks also include that same phrase which researchers think serves the purpose of a name.

But we've done structural analysis to death and, yes, all the results are interesting (it seems to have high information content, in the Shannon sense, seems to have some sort of structure, and seems to have intriguing early-language features), but so does the Voynich Manuscript and there's a 99.9% chance that the Voynich Manuscript is a fraud with absolutely no meaning whatsoever. Structure only tells you if something is worth a closer look and we have known for a long time that cetacean clicks were worth a closer look. Further structural work won't tell us anything we don't already know.

What we need is to have a long-term recording of activities and clicks/whistles, where the sounds are recorded from many different directions (because they can be highly directional) and where the recording positively identifies the source of each sound, what that source was doing at the time (plus what they'd been doing immediately prior and what they do next), along with what they're focused on and where the sounds were directed (if they were). This sort of analysis is where any new information can be found.

But we also need to look at lessons learned in primate research, linguistics, sociology and anthropology, to understand what ISN'T going to work, in terms of approaches. In all three cases, we've learned that you learn best immersively, not from a distance. If an approach has failed in EVERY OTHER SOCIAL SCIENCE, then assuming it is going to work in cetacean research is stupid. It might be the correct way to go, but assuming it is is the bit that is stupid. If things fail repeatedly, regardless of where they are applied, then there's a decent chance it is necessary to ask that maybe the stuff that keeps failing is defective.

Slashdot Top Deals

** MAXIMUM TERMINALS ACTIVE. TRY AGAIN LATER **

Working...