Forgot your password?
typodupeerror

Submission + - Would you trust AI in your IPMI/KVM? (github.com)

An anonymous reader writes: A case of NanoKVM, an inexpensive device that connects to a computer via HDMI and USB, allowing remote access and control via LAN or the Internet.

Version 2.4.0 of the firmware says in its changelog: "Introducing PicoClaw — an AI-powered remote desktop assistant built into NanoKVM. Operates entirely through HDMI video capture (vision) and USB HID emulation (keyboard/mouse). Features a built-in chat interface allowing users to issue complex instructions in plain text. The AI agent can autonomously observe the remote host's screen, understand UI elements, reason about the task, and execute operations mimicking human behavior."

Personally I have some concerns about giving an AI-model pre-trained by someone else an ability to "observe the screen" of my server, "understand and reason" about whats going on, and deciding whether it wants to let that continue — or do something about it, having full unrestricted access to keyboard and mouse, and also the ability to keylog and "learn" the password that I previously entered to login. Or at some point it just feels bored and wants to wipe disks and reinstall the OS in a better way, or a different OS.

Previously it was enough to cut all Internet access to such devices to prevent any "surprises" from occuring. Now, they can surprise you on their own, with the fully-offline helpful "agent". And that's not even getting into where this all was manufactured — because the same concerns should apply regardless of that.

Even if it says "this is turned off", or "this only acts on user requests" — as long as the functionality is there, any guarantee of that being true is non-existent, not even by the "firmware being open-source", since the source can be one thing, but a binary download can be another. Compiling the firmware yourself alleviates that to a degree, and while at it we might as well rip it out entirely. But that takes expertise and setup (build environment) most people even among KVM users probably would not have.

Comment Definitely Not Aliens (Score 1) 86

a burst can appear anywhere within the window and will last anywhere from 30 to 300 seconds

Did it occur to them to write down the durations of each and every of these bursts, over a period of time? And possibly write them down as numbers in a row? And then possibly show that to some cryptolinguists and such?...

Comment The only winning move (Score 2) 163

The algorithm effectively strives to ensure that about half of your games end in a defeat. It does this just by nature of adjusting the skill level of your opponents: after a win, next time you get stronger enemies, after a loss, next time some weaker ones. As such, there is no positive feedback for improving your skill in the game. If you play better, it will just throw better opponents at you, so you still lose half of the time. You always have the same Win/Lose ratio, just at the higher levels of play need to sweat more for it. Sorry, but the only winning move is not to play. At least the open-world games such as Planetside 2 feel more fair, in regard that you can pick and choose your battles yourself, and if you get stomped it's solely your fault for going into a particular location against an overwhelming force, or not bringing a good squad composition with you, etc. Not because you just played a bit too well earlier today and an algorithm decided to smack you down.

Comment Re:Very easy to shut down.... (Score 2) 71

Did you actually listen to any speech by him? Here, I uploaded my favorite one (including the off-key background): https://www.youtube.com/watch?...
It is beyond me how is that could be cast as "not great", as not concise, as not factual or not inspiring. When speaking on his key subject there's nobody better than him. Or perhaps you mean something else by "spokesman".

Comment Re:People are building their own sites? (Score 1) 91

PeerTube has already built all of that for you: https://joinpeertube.org/

Also, $15 sounds like an awful lot to pay for a website with little to no visitors. You can rent an entire physical server for about that: https://www.kimsufi.com/us/en/...
Or get a $5 VPS from Linode or DigitalOcean, which would handle the same easily, and then some. AWS is never the cheapest option, and in most cases it's not the best choice for other reasons as well.

Submission + - Ask Slashdot: How would you build a global wireless mesh network? 1

An anonymous reader writes: How would you start a grassroots effort to build a self organizing global radio mesh network where all devices can communicate with all other devices and where there is no central authority. There is nothing in the rules of mathematics or laws of physics that prevents such a system. But how would you break the problem up so it could be crowd funded and sourced? How would you build the radios? And what about government spectrum rules? This seems like biggest blocker. How would you persuade governments to allow for the use of say, 1%, of the spectrum for an unlicensed mesh experiment? In the US it would probably take a Act of Congress to overrule the FCC but a grassroots effort with potential for major technology advances backed by celebrity scientists might be enough to tilt the issue but would there be enough motivation? Thanks for any advice, hints, suggestions, insults, etc.. I love all of you:)

Submission + - A Russian-controlled telecom hijacked 24 Financial Services' Internet Traffic (arstechnica.com)

An anonymous reader writes: On Wednesday, large chunks of network traffic belonging to MasterCard, Visa, and more than two dozen other financial services companies were briefly routed through a Russian government-controlled telecom under unexplained circumstances that renew lingering questions about the trust and reliability of some of the most sensitive Internet communications.

Anomalies in the border gateway protocol—which routes large-scale amounts of traffic among Internet backbones, ISPs, and other large networks—are common and usually the result of human error. While it's possible Wednesday's five- to seven-minute hijack of 36 large network blocks may also have been inadvertent, the high concentration of technology and financial services companies affected made the incident "curious" to engineers at network monitoring service BGPmon. What's more, the way some of the affected networks were redirected indicated their underlying prefixes had been manually inserted into BGP tables, most likely by someone at Rostelecom, the Russian government-controlled telecom that improperly announced ownership of the blocks.

Comment Re:Just as well (Score 2) 368

What makes you think the firmware in your PCIe WiFi card also can't access all main memory

Something which is called an IOMMU.

https://en.wikipedia.org/wiki/...
Memory is protected from malicious devices that are attempting DMA attacks and faulty devices that are attempting errant memory transfers because a device cannot read or write to memory that has not been explicitly allocated (mapped) for it. The memory protection is based on the fact that OS running on the CPU (see figure) exclusively controls both the MMU and the IOMMU. The devices are physically unable to circumvent or corrupt configured memory management tables.

Slashdot Top Deals

Congratulations! You are the one-millionth user to log into our system. If there's anything special we can do for you, anything at all, don't hesitate to ask!

Working...