Forgot your password?
typodupeerror

Comment Control of Secure Boot via the Windows copyright (Score 1) 96

Microsoft has no control over secure boot. You can even load your own custom keys for the Windows boot process

Microsoft has control over distribution of the copyrighted Windows operating system. It has used this control to dictate whether or not makers of devices that include Windows are allowed to let users load their own custom keys. For example, Microsoft required makers of devices that come with Windows RT (the port of Windows 8 and Windows 8.1 to ARM architecture) to block end users from turning off Secure Boot and block end users from loading their own custom keys, as conditions for a license under copyright to distribute Windows RT on those devices.

AI

Claude Code Leak Reveals a 'Stealth' Mode for GenAI Code Contributions - and a 'Frustration Words' Regex (pcworld.com) 38

That leak of Claude Code's source code "revealed all kinds of juicy details," writes PC World.

The more than 500,000 lines of code included:

- An 'undercover mode' for Claude that allows it to make 'stealth' contributions to public code bases
- An 'always-on' agent for Claude Code
- A Tamagotchi-style 'Buddy' for Claude

"But one of the stranger bits discovered in the leak is that Claude Code is actively watching our chat messages for words and phrases — including f-bombs and other curses — that serve as signs of user frustration." Specifically, Claude Code includes a file called "userPromptKeywords.ts" with a simple pattern-matching tool called regex, which sweeps each and every message submitted to Claude for certain text matches. In this particular case, the regex pattern is watching for "wtf," "wth," "omfg," "dumbass," "horrible," "awful," "piece of — -" (insert your favorite four-letter word for that one), "f — you," "screw this," "this sucks," and several other colorful metaphors... While the Claude Code leak revealed the existence of the "frustration words" regex, it doesn't give any indication of why Claude Code is scouring messages for these words or what it's doing with them.

Comment Tap or click to view article (Score 1) 43

No video (or animated image) should ever load/autoplay unless the user interacts with that element, indicating he/she wants to play it.

How granular would the permission be? If web browsers start blocking all animation and post-load layout shifting by default, including CSS transitions and animations, this would encourage website operators to structure the page to coerce permission to animate in each document. For example, a website operator could make each page load blank other than a notice to the effect "Tap or click to view 'Title of Article' on Name of Site."

Comment You have no IP address. Your neighborhood does. (Score 0) 35

How are you going to host a game server on a home computer if you share your IPv4 address with other subscribers to the same ISP in the same neighborhood,[1] and the combined modem and router that your home ISP requires all subscribers to use lacks an option for port forwarding? Both of these are true, for example, of T-Mobile US Home Internet.

[1] Many home ISPs apply carrier-grade network address translation (CGNAT) to conserve IPv4 addresses since the worldwide exhaustion.

Comment Why we don't polygraph people anymore (Score 2) 116

I can think of a few things leading to Voight-Kampff-style polygraph tests being phased out in this timeline

1. Several U.S. states have banned reliance on polygraph test results by employers. "Polygraph" on Wikipedia lists Rhode Island, Massachusetts, Maryland, New Jersey, Oregon, Delaware and Iowa. In addition, the federal Employee Polygraph Protection Act 1998 generally bans polygraphing by employers outside the rent-a-cop industry.
2. Autism advocacy organizations raised a stink about false positive results on autistic or otherwise neurodivergent human beings.
3. The LLM training set probably picked up answers from someone's cheat sheet, such as "The turtle was dragging its hind leg, and I was waiting for it to stop squirming so I could see if it needed to go to the vet."

Comment Free apps are more likely to use protocols (Score 1) 68

you have your itinerary saved in a note taking app that isn't on the appstore

If an app meets F-Droid's licensing policy then it is more likely to follow the principle that protocols are better than platforms. This means there are probably other apps, probably including apps on Google Play Store, that can reach the document repository where you saved your itinerary.

Comment Apple was beaten to Tivoization by decades (Score 1) 68

insane market (started by Apple) of personal devices that you buy that you literally don't have admin access on

That was 1985 with the Nintendo Entertainment System and the Atari 7800 ProSystem, the first popular home computing devices to use cryptography to lock out unauthorized software. Between that and the iPhone was the TiVo DVR, the first popular home computing device to use cryptography to lock out unauthorized derivatives of copylefted software.

Slashdot Top Deals

The problem that we thought was a problem was, indeed, a problem, but not the problem we thought was the problem. -- Mike Smith

Working...