Forgot your password?
typodupeerror

Comment Re:Sigh. (Score 2) 34

Of the Chromium base code?

They are literally that simple, it's an extreme example of well-established cross-platform code for... what... a decade, decade and a half now? Everything from Chromebooks and Android to Windows and Linux.

-- used to cross-compile all my code - and others - to half a dozen platforms, including ARM, 32- and 64-.

Granted if it was code never intended to port and was doing all sorts of nonsense low-level optimisation tricks, sure, but Chromium? No. They just cross-compile and target the relevant 64-bit libraries.

Comment Re:I smell BS (Score 2) 36

You literally aren't understanding.

It means a foreign host can host your database, perform database actions that you ask them to, and at no point reveal anything to that host about the contents of your database.

Microsoft CAN, on your instruction, remove a row, or filter, or sort or whatever SQL you want to do, on your database, without knowing what the data is. The database will be manipulated from an encrypted database WITHOUT that action being performed to an encrypted database WITH that action having been performed without, at any point, been decrypted (even partially, in small bits, etc.... not AT ALL).

So you can have a host manage your database, perform all the normal actions, operate your website, use it like a normal database but... that host knows NOTHING of what's stored in your database.

The reason homomorphic encryption is so processor-intensive is because it does this WITHOUT giving out metadata. You're just asking the host to perform a series of homomorphic operations, and they're performing them to the encrypted data to translate it to more encrypted data. They have no idea about anything in the source data, the result, or anything else.

Honestly... go read up on it. It's been being developed for decades and takes STUPENDOUS computer power for a reason. Because it stops the kinds of attacks you're talking about. It's literally a form of safe computing on hostile architecture.

Comment Re:I smell BS (Score 2) 36

Homomorphic encryption is well-documented, it's just incredibly slow with conventional technology.

You can do any binary process on encrypted data using homomorphic encryption - it will modify the encrypted data in-situ without ever needing or knowing what the unencrypted data is. It literally doesn't care, and can't tell.

Think of it like running, say, "AND" or "OR" Boolean commands on specially-encrypted data. You design it in such a way that the "AND"/"OR" processes manipulate the encrypted data. Which, itself, manipulates the data that's encrypted to perform AND and OR operations on it.

You still don't know what the decrypted data says, but you were able to perform an AND operation on it.

Now you know that by combining many simple Boolean operations, you can basically manipulate that data however you like... WITHOUT ever decrypting it.

It takes, no exaggeration, something like hundreds of millions of times more base mathematical operations to perform a simple AND in this scenario but it does so preserving the encryption without ever revealing the data.

You can literally work on encrypted data that you NEVER HAD THE KEY FOR. So you can have a customer database that you host, and you can do things on that data (e.g. compress it, retire old entries, etc.) without ever having any access to the raw data.

It's a literal entire area of computer science and cryptography that's only been possible for the last couple of decades (through sheer processing power alone) but been theorised, described and proven for decades more.

Intel hasn't made anything up. Microsoft have homomorphic systems too. And IBM. Just nothing commercial, because the hardware required is STUPENDOUS or very slow.

And the operations you perform on the encrypted data literally never know the decrypted key. The "input" is encrypted. You perform operations. And the OUTPUT is ALSO encrypted. But you were able to do the operations without ever knowing what the data actually represented.

It's going to be enormous when it becomes viable. Microsoft can host your SQL database, maintain it for you, even remove old database entries before a certain age, etc. without ever having known the original unencrypted data or your encryption keys. It's the future of things like VMs and cloud-hosting, but still decades away.

Rather than yell and bawl... go look it up. But if you want to really satisfy yourself, you might want a grounding of at least a few years post-grad maths and cryptography.

Comment Re: good (Score 1) 76

From what I know, Fascism's core is the idea that the individual's existence is for the collective. So "collective first" is Fascism, whereas "individual first" is the core of Liberalism. I'm guessing modern leftism would be "oppressed first", but that's a different discussion altogether.

The dictionary definition seems pretty similar to what I just said.

Thing is, both definitions seem to capture communism too.

Comment OpenAI needs a new hail mary (Score 4, Interesting) 93

What about Altman making "Open" AI closed-source and for-profit years ago didn't tell you he was a dirty, money-grubbing cunt ?

Bring on the bankruptcy !

LLAMA was [illegally] released into the public three years ago (to the day - March 3, 2023), and it's estimated that ten years of AI improvements happened in the subsequent 6 months. People were doing all sorts of things with LLMs that meta hadn't thought of, or didn't have time to develop. Such as text-to-audio, local LLM use, and automated manuscript generation.

All these attempts at monetizing the LLMs are, at the same time, holding back the progress of AI development. If OpenAI wants to leap ahead of the competition, they should put their language model online and see what the community comes up with.

I get it - training a LLM takes roughly $100 million for the initial dataset, and companies need to recoup this expense.

Still, I'm saddened that I can only use the system for purposes that the company approves of, and in ways that they have already thought of.

There's a lot of potential there, and we're not making good use of that.

Comment Boot time (Score 1) 137

Framework laptop.

Not long at all.

The restart/reboot is ridiculously fast.

Resume from suspend/hibernate is ridiculously fast.

The BIOS transferring to the bootloader? Seconds.

Honestly, it's like being in the year 2000 again. And my computer does what I say. Mostly because it's Linux.

Slashdot Top Deals

A fail-safe circuit will destroy others. -- Klipstein

Working...