Forgot your password?
typodupeerror

Comment Re:On Star Phone Home (Score 1) 35

In my younger and more foolish days I had a Pontiac and I opted out with wire cutters to the Surveillance module's power cables.

At the time I was actually more concerned with remote unlock hijacking than tracking but still I didn't trust GM.

All together now: WE TOLD YOU SO.

If I had to guess 20 years later doing that would disable the ECU.

Comment Useful and interesting - Is Gemini Claude? (Score 4, Interesting) 7

I've been wondering about the links between models for some time. The GPT's are easy to tell from everyone else, and from each other. Not just because they are dumb as stumps, but because of their arrogance about finding the hill of some wrong "fact" and dying on it. Normally it's not too hard to tell them apart, but recently I've noticed that Gemini and Claude are almost indistinguishable. And I would agree, there are certain interesting phrases each use. Like Claude's "Spot On" which Gemini has been emulating lately.

I'd be very interested in running a fingerprint on the both of them to see what comes up.

Comment Re:Friendly reminder (Score 1) 46

SSH, HTTPS, scp, likely any protocol ending in an S in fact.

SSH can work very well with non-aes primitives, with chacha20 being both more secure and faster

The major distros however don't tend to do "custom distro" for you.
They generate various keys using AES on first install. They want you to either have an Internet capable system or at least be able to apt-get install a web browser.

Please show your work that any major distro creates ANY aes key on install. If you are conflating ssh key with AES, then see above.

So the real answer to your question is, why wouldn't you want a pre-loaded driver to use your systems hardware accelerated AES?

1) Because outside WDE, AES is not often used in any performance critical way for 99% of users
2) Because AES-NI is not universally trusted
3) Because in most places where AES previously was beneficial, there are now faster and more secure algos
4) Because every compiled-in default is attack surface that can't be mitigated without a new kernel command line + reboot, or if there is no command-line disable for it, a new kernel

In short, EVERYONE can load a module to get functionality. Only some compiled in drivers can be turned off without a new kernel and none can be turned off without a reboot.

Comment FlashAttention (Score 2) 46

I did some math the other day on running local AI models and the net result is most homes can't afford to run the current median models.

They don't just need 80GB of VRAM, they need newer architectures - to be supported by CUDA, to be supported by pytorch, etc.

These problems may well be solvable with more clever use of hardware, MoE, acceptable quantization, etc., but today you're in for several grand and something north of 100W idle to use what is effectively a $20/mo plan.

A small enterprise can afford local, so that's good. We paid more than that for one SGI machine back in the day.

The point of the exercise was to plot the position on the curve. We're at something like 2006 YouTube where nobody could afford the drives or bandwidth that YouTube/Google was giving away for free (aka with VC money). Eventually hard drives got cheaper, people got gigabit at home, FlashServer was replaced with h.264/HTML5, phones could stabilize video locally, etc.

So it looks like these AI companies need to stay alive for about seven more years giving away product at a loss, or at least highly oversubscribed, to turn a profit. Hence the low token allowance, the banning of OpenClaw, etc.

On the other hand, I read the blog of a security researcher yesterday who found an exploit with (IIRC) Claude, tried to refine the PoC, but got dinged on "out of tokens" before he could finalize it. So he just deleted the work and moved on.

It sounds like they're trying to not lose money at such a velocity and are trying to find a sweet spot where people don't just declare it too underpowered to use.

A global energy depression may well take out the supermajority of the companies that believe they can burn investment money for seven more years. There is circular financing money, then there is real return on capital money. One is to fool the markets, the other is grounded in current physics.

Comment Oh no, DO trash it (Score 1) 107

I'd love to trash Edge, but it's hard to argue against Microsoft's analysis here.

You are treating like RAM that Edge has now will always belong to Edge,

Memory allocations are not sanitized by the OS. They are not automatically zeroed before being handed to the process on malloc or purged after the process hands it back to the OS on free. Any ole user process can a) see what other processes are running and, b) allocate RAM almost without limit. So all a user process has to do is look for whether or not Edge is running. If it is, then when it stops allocate as much memory as possible to grab the RAM that Edge just freed.

Slashdot Top Deals

Computer Science is the only discipline in which we view adding a new wing to a building as being maintenance -- Jim Horning

Working...