Forgot your password?
typodupeerror

Comment Re: Market forces at work (Score 2) 213

Or maybe there needs to be way more EVs that are pickup trucks and SUVs that people can actually afford.

Pickups and SUVs are already subsidized out the ass by getting to skirt emissions and safety laws due to being "light truck commercial vehicles". This bullshit fantasy has persisted for decades even as they've become far and away the highest selling commuter and passenger vehicles in the US.

Maybe if people had to start paying the real price of these gas guzzling murder machines they'd be more interested in a reasonable EV or hybrid sedan or minivan. The only silver lining of Trump's demented Iran war is diesel hitting $6 per gallon and the sound of all those F150 tears.

Comment ah yes... secure software development... (Score 1) 43

It's hard enough to get actual developers to properly consider security. Not surprised at all that vibe coders don't.

Plus, of course, most of the training data is insecure to begin with.

But let them learn by fire that there's a reason actual programmers take time to ship a product, and it's not that the AI can type faster.

Comment ah, the old consciousness thing... (Score 2) 399

Problem is: We don't even know what consciousness is.

So the best we can say is if something creates the impression of having one, based on whom we attribute consciousness to, i.e. other humans. Well, big surprise that a model explicitly trained on human language and texts creates that impression. It does show just how good the models are. At pretending to be human because they have a shitload of examples on what humans would say.

For all we know, the gas clouds on Jupiter could be conscious, just in a way that is completely baffling to us. We can't rule it out because we don't know what consciousness is, so we can't test for it.

Comment Re:I'd love to trash Edge, but... (Score 1) 107

If an attacker has enough control of your machine to dump the password database, they have enough control to get it to retrieve the plaintext passwords

Not true.

An attacker may have a limited window. He might exploit some other vulnerability to do some operation with privileged access rights, but not have an admin shell.

Submission + - BFS: What the Textbook Says and What It Looks Like Running (rebraining.org)

fishbowl writes: A working lecture on breadth-first search, anchored to a real implementation — 22 lines of JavaScript from a single-file browser hex game. Walks through why every line is there and how you might have arrived at it yourself. Python and Java equivalents included. Cormen is waiting when you want it.

Comment Re:questionable (Score 1) 113

Tell you what, you "prove" that the religion of your choice is a "real" religion

Oh, that's trivial: a) it's made-up nonsense, b) it tells people how to live their lives and c) it's been around for so long that people forgot that it's made-up nonsense.

None of that or the rest of your answer has anything to do with the point I was making: That "accepted as a religion in the USA" isn't much of an argument. If people can get Jedi accepted as a religion, it just proves how meaningless all of that is. Other countries have correctly identified Scientology as a pyramid scheme and a scam.

The fact that other religions would qualify for that as well doesn't make it any less true.

Comment Re:Wait! What? (Score 1) 131

You consented the moment you got a cell phone or a car that had GPS built-in or installed an OS or got internet at your house...

No, I did not. These are features that exist for my convenience, not as mass surveillance tools. The government is abusing them.

You can disable GPS on your device all you want... your cell radio signal is still enough to get your location within (I think) a few meters (depending on factors).

Yes, if you have control of the cell towers. Or run an IMSI catcher. But the technological solution applied is not the question. The question is if we want someone as untrustworthy as our governments to be able to constantly track us.

So what, if a thousand other IMEIs show up on the screen...

The fact that you personally maybe don't care doesn't give you the right to opt-in all of us who might care. The problem is that once the technology exists, it will be abused. It already is. If we explicitly allow it, abuse will run rampant. We already have examples of cops using surveillance tech to spy on their spouses, or to stalk that cute girl from the bar. We have tons of examples of surveillance permissions granted for one purpose being used for another one. When the government wants these laws it's always to find child abusers and terrorists. But that is never what they actually have in mind.

Slashdot Top Deals

The rule on staying alive as a program manager is to give 'em a number or give 'em a date, but never give 'em both at once.

Working...