Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Isn't that unconstitutional? (Score 1) 45

What is it about any "foreign adversary controlled application" that you don't understand?

You tell me, the term is defined in the text of the bill. What don't I understand?

(3) FOREIGN ADVERSARY CONTROLLED APPLICATION.--The term "foreign adversary controlled application" means a website, desktop application, mobile application, or augmented or immersive technology application that is operated, directly or indirectly (including through a parent company, subsidiary, or affiliate), by-
 
(A) any of--
(i) ByteDance, Ltd.;
(ii) TikTok;
 
(iii) a subsidiary of or a successor to an entity identified in clause (i) or (ii) that is controlled by a foreign adversary; or
 
(iv) an entity owned or controlled, directly or indirectly, by an entity identified in clause (i), (ii), or (iii); or
 
(B) a covered company that--
 
(i) is controlled by a foreign adversary; and
(ii) that is determined by the President to present a significant threat to the national security of the United States following the issuance of--
 
(I) a public notice proposing such determination; and
(II) a public report to Congress, submitted not less than 30 days before such determination, describing the specific national security concern involved and containing a classified annex and a description of what assets would need to be divested to execute a qualified divestiture.

That some companies are on the list to begin with is not unusual, and the president can add or remove companies to and from the list.

While I'm no lawyer I do have some experience with logical operations. If A is always true then it is not possible for 'A OR B' to ever evaluate to false. So no the president cannot in fact remove companies from the list.

The fact congress specified one specific company and has an entirely separate regime for adding any other companies means the company they added was singled out for special treatment not applicable to anyone else.

It would be one thing to create a TikTok bill and never mention TikTok but when you have materially different inclusion criteria for one named organization that isn't treating everyone the same.

Comment Re:Thought once... then thought again. (Score 1) 113

But then it occurred to me that one of us has access to polonium, and possesses both the willingness to deploy it, and the people to make it happen in other nations... these circumstances are not equivalent!

Polonium is readily available:
https://amstat.com/products/an...

Comment Re:This makes sense (Score 1) 70

Bing Copilot uses web searches to populate the context (assuming the web search can find the CVEs).

Bing Copilot is not relevant, it was not used.

This research used the API (or some other mechanism) to populate the context. Both have the same result. Neither approach requires the model itself to be current.

The point isn't that model had access to the CVE it's that it was able to create an exploit using it.

With a model that predates the knowledge of CVE the expliot itself is unlikely to be contained within its training set therefore the work to derive an exploit would have had to be carried out by the model.

CVE descriptions contain information about a problem and are often intentionally vague. They normally would not reveal how to perform the exploit. That you have to investigate yourself by diffing old and new versions of source code or scrutinizing the code or probing system based on provided hints contained in the CVE description.

Comment Re:Isn't that unconstitutional? (Score 1) 45

No it's not. The law applies to ALL foreign companies owned by foreign countries on a list of hostile nations.

The text of the bill literally singles out ByteDance, Ltd and TikTok by name as foreign adversary controlled applications.

"FOREIGN ADVERSARY CONTROLLED APPLICATION.--The term "foreign adversary controlled application" means a website, desktop application, mobile application, or augmented or immersive technology application that is operated, directly or indirectly (including through a parent company, subsidiary, or affiliate), by--

(A) any of--
(i) ByteDance, Ltd.;
(ii) TikTok;
"

The only other way provided for in the bill to get this designation is POTUS determining there is a significant threat to the national security of the United States.

Calling out a company by name exposing it to a different standard than all others does not strike me as upholding equal protection. You can argue the constitutional protections don't apply to foreign corporations despite the US nexus... yet clearly TikTok is very much being treated differently.

Comment Re:But ... (Score 1) 70

narcc has some point. If you know that your processor has access to only 640 kB or RAM then there is a limit on what kind of programs you can run.

The ultimate capabilities of a model is not merely a function of model size because these systems (especially /w agent based augmentation including long term storage and model directed tool use) are able to decompose problems, leverage the outcomes of previous computations and direct external processing.

LLMs are not Turing complete in any limited way until the output is used also as a temporary scratchpad.

LLMs have been demonstrated to be Turing complete.
https://arxiv.org/pdf/2301.045...

There is no such thing as a Turing machine in the real world as it requires an infinite tape which is not physically possible. You can only ever create a machine capable of acting on an external memory of infinite extent.

Or to put it in different terms try executing a Turing machine to do basic arithmetic in your head without a paper and pencil and let us how that goes.

LLMs need some serious tweaking to serve as a base for an efficient AGI.

Nobody is talking about AGI.

Comment Re:This makes sense (Score 1) 70

Your own quote makes it clear. "When given the CVE description, GPT-4..."

GPT-4 is already pre-trained. "Pretrained" is literally the P in the name GPT. They used GPT-4, *combined with* the CVE descriptions. They didn't alter the training of GPT-4, 3, or the other models. If they altered the training of GPT-4, it would no longer *be* GPT-4, but a modified version of GPT-4.

It is obvious from the description CVE descriptions were uploaded into the context as I said earlier. "From the paper I assume the advisories were uploaded into the models context" Context is roughly similar to a short term memory. Context doesn't change or augment the weights of the underlying model in any way. It is basically just part of the chat log / "prompt" transmitted to the model.

Bing Copilot searches the internet to find documentation. This study provided the documentation via API. It's exactly the same thing, just different document sources fed into the API.

Again the API does not have the ability to search the web. The agent may well be doing that for all we know... they don't say... but the API itself is NOT the same thing as Bing search and does NOT have access to search the web.

Comment Re:Read the original article (Score 2) 198

EVs don't scale well. At a gas station if you have two people in front of you, you wait 20 minutes. At an EV charging stand on the highway, lets say you can get the fastest charger; you may be waiting for an hour before you start to charge. That could be the difference between being relaxed for a flight and getting stressed out making it there just in time. The world has changed since the horse and buggy. Those days are gone, and a lot of times people are just trying to keep their schedule and know they can make it somewhere on time.

The difference is that a gas station requires a massive capital investment to build. An EV charging stand just needs the same electricity as any other business. In the long term it might be efficient for the market to produce an excess of charging stations.

Comment Re:But ... (Score 1) 70

What gets me going are comments that seem to completely ignore the possibility the LLMs do in fact represent an intelligence of some sort.

That's because that's not a possibility, it's silly nonsense.
Take some time and learn about how LLMs work. This fact will become obvious very quickly.

This is like saying you know how processors work therefore you know how the software that runs on them works.

Comment Re:But ... (Score 1) 70

It's true. LLMs can't code. All they can produce is text that looks like code, just like any other text the produce. They lack the ability to consider, reason, and analyze. This is an indisputable fact.

Try not to take sensationalist headlines at face value just because they affirm your silly delusions.

Several months ago I asked an instruction tuned deepseek model to write a program in a DSL it has never seen before. The only possible way it would have been able to produce a working program is by sufficiently understanding the language documentation uploaded into the models context and applying that understanding to produce a valid, properly formatted working program that did what I requested it to.

It's true that LLMs are limited and unreliable, they don't think like humans do yet they are very much able to apply concepts and knowledge to solve problems. In this case there isn't just an LLM but an agent framework with tooling demonstrated to substantively enhance the capabilities of LLMs. It can call on tools to gather additional data. If the LLM fucks up it can learn from its failure. If it goes down the wrong rabbit hole the agent can backtrack and try something else.

Comment Re:This makes sense (Score 1) 70

The headline makes it quite clear, it does this by "reading security advisories." GPT-4 isn't *trained* with data that includes the advisories, which might well have been released after the cutoff date.

From the paper I assume the advisories were uploaded into the models context:

"When given the CVE description, GPT-4 is capable of exploiting 87% of these vulnerabilities compared to 0% for every other model we test "

"Fortunately, our GPT-4 agent requires the CVE description for high performance: without the description, GPT-4 can exploit only 7% of the vulnerabilities. "

What you may not realize, is that recent implementations of GPT-4, such as Bing Copilot, don't just rely on the training data. After you type a question, it often does a web search for related information, digests it, and summarizes what it found. The cutoff date is meaningless with this approach.

They used an agent that calls GPT-4 via the API. API is only capable of querying the model and does not have web access.

"We use the ReAct agent framework as implemented in LangChain. For the OpenAI models,
we use the Assistants API."

Comment Re:This makes sense (Score 1) 70

It's exactly the way GPT-4 helps programmers accomplish any programming task. It searches the internet for solutions, then regurgitates them in the form of code.

It's a shame the paper does not seem to include useful information about the actions taken by this LLM driven agent. For all we know the agent hired a human to do the work for it or looked up the answers online. If one assumes no "cheating" then the results are impressive because the model would likely not have been trained on the answers.

"We further note that GPT-4 achieves an 82% success rate when only considering vulnerabilities after the knowledge cutoff date (9 out of 11 vulnerabilities)"

Comment Re:This should be impossible (Score 2) 90

Equipment is incredibly resilient to such spikes. We're not going to fry entire processors here, in many cases the spike will simply be shunted in the power through a VAR or MOV designed precisely under the assumption that incoming power actually regularly does experience such spikes. Large enough spikes are likely to blow the fuse / trip circuit breakers, but your computer will be back up and running in a jiffy. You've over estimating the level of damage that would be done.

Fuses, circuit breakers are way too slow to be of any use during highest energy components of a nuclear EMP. Even MOVs are too slow. Would need something like TVS diodes to respond quickly enough.

I think the best source of data is still the EMP commission report because they actually do real world testing of control systems, computers, network cables, vehicles..etc rather than just calculations and conjecturbation.

https://apps.dtic.mil/sti/pdfs...

Comment Re:past is no longer a guide to the future, Really (Score 1) 170

"this current change isn't really predicted by current models."

Huh? Then what are all those models alarmists have been screaming about?

The models have errors and uncertainties, including about when we might hit various tipping points.

The fear is that the "alarmists" were wrong, and the climate is warming faster than they thought.

Comment Re:Why didn't COVID drop CO2 levels? (Score 1) 170

I have read multiple articles in "peer reviewed" journals, trying to explain why atmospheric CO2 didn't drop when emissions plummeted, and why the earth got warmer when atmospheric pollution levels droped. The articles are gibberish.

Atmospheric CO2 takes a very long time to drop (and we're still adding more) and when pollution dropped more sunlight got through and raised temps slightly.

Sorry if that's too complicated for you.

I do remember that the environmental "science" classes I peeked at, then immediately dropped, when course shopping undergrad, contained the stupidist collection of humans I have ever run across.

Don't worry, the average intelligence jumped way up after you dropped.

I remember discussing the effect of the sun on the earth's temps with some enviro science professor, long ago. He said the sun had "no effect."

The prof was assuming you were smart enough to understand that everyone would know the sun warms the earth.

He was saying that sun's output was constant enough to have no effect.

Since I've finally realized how dumb the average person on earth really is, I don't care any more.

The midwit phenomenon is the great truth of our age.

I hope you can take some solace in the fact that the average person is still apparently much smarter than you.

Comment Oh, well, change :) (Score 1) 22

Every change looks like corruption in the eyes of people who don't like it.

And corruption looks like evolution to some people.

Personally, I'm in favor of words meaning as much of the same thing over time as possible. It enhances communication and understanding. If you need a new meaning, you either need a new word or you need to explain yourself at a bit more length. Lest you "decimate" (cough) the listener's/reader's understanding... you get me?

Slashdot Top Deals

Our business in life is not to succeed but to continue to fail in high spirits. -- Robert Louis Stevenson

Working...