Forgot your password?
typodupeerror

Comment Re:Gas stations do it (Score 1) 194

With a gas station the price is set when you pul/push the handle/button on the pump, you are not filling up and in the middle the price changes.
With grocery stores I can be in there for a period of time, if you up or lower, no one will care about the lower the price, after I have placed the item in a cart then you have a legal issue.
So the problem becomes how do you make sure you have not raised the price on products for that person who is still shopping. Stores use to do it while closed to the public. Hard to do that with dynamic pricing or when open 24 hours.
So most stores do a thing where if the price goes down they lower at the register then start changing prices on item. If going up you change on the items then wait an hour or two and raise at the register. There goes that dynamic pricing. However just regular prices change are made really easy with those digital price tags.

Comment Re: I Hope They Win (Score 1) 26

It's also a bit rich to say, "This is publicly available, you can read this, but you're forbidden from learning anything from it."

Bear in mind, large laguage models are often trained in a single pass these days. This means that the model looked at the documents once, and updated its weight imperceptibly. If it's capable of repeating something verbatim from that, it's only because it's model of the world was already so good from all its other training data, that what was in the Britannica document was extremely predictable. In other words, that there was almost no additional information there.

And that's as expected from an encyclopedia! If there's anything surprising in an encyclopedia, that's a bad sign.

Comment And complexity (Score 3, Informative) 87

the selection of a 40 year old 6502 application is interesting,

Not even the application, just a 120 byte-long binary patch.

It may however help if someone identifies a small digestable chunk as security relevant and set it about the task of dealing withi t.

And that chunk doesn't have any weirdness that requires a seasoned and actually human reverse-engineer.
(Think segmented memory model on anything pre "_64" of the x86 family - the kind of madness that can kill Ghidra).

Also, if it's not from the 8bit era or the very early 16bit era, chances are high that this bit of machine code didn't start as hand-written assembler but some higher-level compiled language (C most likely). It might be better to run Ghidra on it and have some future ChatBot trained on making sense of that decompiled code.

In short there so many thousands of blockers that have been carefully avoided by going to that 40 year old 120-byte long patch of 6502 binary.

Comment Good example of why it's wrong (Score 4, Insightful) 87

But what if you had a similarly loose platform but it's running a kiosk and that kiosk software is purportedly designed to keep the user on acceptable rails.

There is a lot of leverage done by the "similarly".

Apple's computers run on 6502.
This was an insanely popular architecture. It's been used in metric shit tons of other hardware from roughly that era. There are insane amounts of resource about this architecture. It was usually programmed in assembly. There has been a lot of patching of binaries back then. These CPUs have also been used in courses and training for a very long time, most of which are easy to come by. So there's an insane amount of material about 6502 instructions , their binary encoding, and general debugging of software on that platform that could be gobbled by the training of the model. The architecture is also extremely simple and straightforward with very little weirdness. It could be possible for something that boils down to a "next word predictor" to not fumble too much.

Anything developed in the modern online era, where you would be interested in finding vulnerabilities is going to be multiple order of magnitude more complex (think more multiple megabytes of firmware not a 120 bytes patch), rely on very weird architecture (a kiosk running on some x86 derivative? one of the later embed architecture that uses multiple weird addressing mode?) and very poorly documented.

Also combine this with the fact that we're very far into the "dimishing returns" part of the AI development, where each minute improvement requires even vastly more resources (insanely large datacenter, power requirement of entire cities) and more training material than available (so "habsburg AI" ?), it's not going to get better easily.

The fact that a chat bot can find a fix a couple of grammar mistake in a short paragraph of English doesn't mean it could generate an entire epic poem in a some dead language like Etruscan (not Indo-European, not that many examples have survived, even less Etruscan-Latin or -Greek bilingual texts have survived to assist understanding).
The fact that a chat bot successfully reverse engineered and debugged a 120-byte snipped of one of the most well studied architecture doesn't mean it will easilly debug multi-mega bytes firmware of some obscure proprietary microcontroller.

Comment Re: Consequence culture? (Score 5, Insightful) 207

I think the main thing people worry about isn't any specific identity stuff, but simply that you'll be at the mercy of people who could and would hurt you, with total impunity, if they knew what you thought about them.

People have literally been abused for poking fun at the vice president in social media.

Same reason I won't visit Thailand, the only difference being that the king who they will harm you for criticizing, is a lot less in your face obnoxious (let alone murderous) than the US one.

Comment Re:Anything to avoid the Epstein files. (Score 0) 148

You mean things like Biden's DOJâ(TM)s warning to Alabama legislators over transgenderâ'related legislation, in order to pressure political opponents . Political attacks from Biden's DOJ centering on prosecutions viewed by critics , including the appointment of Special Counsel Jack Smith to investigate Donald Trump. Other examples about bidens administration pursued âoeinsidious prosecutionsâ of political adversaries are Dr. Eithan Haim, 2021 DOJ threating parents at local school board meetings, Biden's DOJ insulating Hunter from investigations, and also poltical attacks using the FACE Act.

As for your questions according to democrat yes a few raped children is a small price to pay to protect democrat interested. You only need to look at the cases of Manual cruz-ramierez, juan ramon-vasquez, christian espinosa, ramon ochoa and then the democrats saying things like we need to provide a "safe haven for anyone without legal status", democrats telling any illegal they will have sanctuary in those cities and letting those rapist out, or even multitude of democrat's refusing to hand other similar criminals over for trial and deportation.

Comment Re: How can you call it boom? (Score 1) 82

People embraced EVs. Just as long as by people, you mean not your average Ethiopian, but the ones making decisions in Ethiopia.

And so? That's how it works with most things everywhere. If you're bothered by how the decisions by people with money and power influence regular people's decisions, I suggest you have bigger fish to fry than EVs in Ethiopia.

Slashdot Top Deals

We cannot command nature except by obeying her. -- Sir Francis Bacon

Working...