Readit News logoReadit News
malaya_zemlya commented on Philip K. Dick: Stanisław Lem Is a Communist Committee (2015)   culture.pl/en/article/phi... · Posted by u/m-hodges
int_19h · 5 months ago
Sometimes it's the small details. Remember all the microtransactions in Ubik? "insert coin to open this door" (to his own apartment!) etc.
malaya_zemlya · 5 months ago
I suspect the microtransaction idea was in the air in the 1960s. Nikolai Nosov's "Dunno on the Moon" (https://en.wikipedia.org/wiki/Dunno_on_the_Moon) which is a Soviet satire of American capitalism describes exactly the same idea implemented at the "Economy Hotel" That's 4 years before Ubik.
malaya_zemlya commented on Breaking into apartment buildings in five minutes on my phone   ericdaigle.ca/posts/break... · Posted by u/ChrisArchitect
malaya_zemlya · 6 months ago
There was a time where somebody in SF has figured admin access code to older apartment intercoms (I believe they were manufactured by Linear and maybe other companies too). These intercoms would call the programmed in phone number whenever you type in the apartment access code at the door.

So what they did is add a new fake tenant with a premium 1-900 number and used the intercom to call it, earning themseleves a bit of cash. Naturally, landlords had to foot the bill.

malaya_zemlya commented on OpenAI O3-Mini   openai.com/index/openai-o... · Posted by u/johnneville
sumedh · 7 months ago
> That moat is trivially circumvented by lighting a larger pile of money and less trivially by lighting the pile more efficently.

Google with all its money and smart engineers was not able to build a simple chat application.

malaya_zemlya · 7 months ago
What do you mean? Gemini app is available on IOS, Android and on the web (as AI Studio https://aistudio.google.com/).
malaya_zemlya commented on Two undersea cables in Baltic Sea disrupted   cnn.com/2024/11/18/europe... · Posted by u/mooreds
Demiurge · 10 months ago
How is it trying its hardest when it hasn’t declared a full scale mobilization, hasn’t closed its borders, or switched to war time economy?
malaya_zemlya · 10 months ago
40% of Russian budget is allocated to defense, that's roughly the same level as US during Vietnam war.
malaya_zemlya commented on Thought experiments that fray the fabric of space-time   quantamagazine.org/the-th... · Posted by u/thcipriani
mr_toad · 10 months ago
If you free fall into a black hole you are testing it.

I don’t think that not being able to communicate your results makes it not scientific.

malaya_zemlya · 10 months ago
There's a theological doctrine called https://en.wikipedia.org/wiki/Eschatological_verification that claims that statements like "there's God" or "there's afterlife" are perfectly fine verifiable scientific statements, except that their verification come after death or Second Coming. Your comment reminds me of it.
malaya_zemlya commented on Deep Dive into XZ Utils Backdoor [video]   youtube.com/watch?v=Q6ovt... · Posted by u/peacefullemon
thelastparadise · a year ago
AIUI?
malaya_zemlya · a year ago
As I Understand It
malaya_zemlya commented on Operation Triangulation: What you get when attack iPhones of researchers   securelist.com/operation-... · Posted by u/ruik
mike_hearn · 2 years ago
That's pretty astonishing. The MMIO abuse implies either the attackers have truly phenomenal research capabilities, and/or that they hacked Apple and obtained internal hardware documentation (more likely).

I was willing to believe that maybe it was just a massive NSA-scale research team up until the part with a custom hash function sbox. Apple appears to have known that the feature in question was dangerous and deliberately both hidden it, whatever it is, and then gone further and protected it with a sort of (fairly weak) digital signing feature.

As the blog post points out, there's no obvious way you could find the right magic knock to operate this feature short of doing a full silicon teardown and reverse engineering (impractical at these nodes). That leaves hacking the developers to steal their internal documentation.

The way it uses a long chain of high effort zero days only to launch an invisible Safari that then starts from scratch, loading a web page that uses a completely different chain of exploits to re-hack the device, also is indicative of a massive organization with truly abysmal levels of internal siloing.

Given that the researchers in question are Russians at Kaspersky, this pretty much has to be the work of the NSA or maybe GCHQ.

Edit: misc other interesting bits from the talk: the malware can enable ad tracking, and also can detect cloud iPhone service hosting that's often used by security researchers. The iOS/macOS malware platform seems to have been in development for over a decade and actually does ML on the device to do object recognition and OCR on photos on-device, to avoid uploading image bytes: they only upload ML generated labels. They truly went to a lot of effort, but all that was no match for a bunch of smart Russian students.

I'm not sure I agree with the speaker that security through obscurity doesn't work, however. This platform has been in the wild for ten years and nobody knows how long they've been exploiting this hidden hardware "feature". If the hardware feature was openly documented it'd have been found much, much sooner.

malaya_zemlya · 2 years ago
>also is indicative of a massive organization with truly abysmal levels of internal siloing.

Or a joint project between several organizations.

malaya_zemlya commented on OpenAI researchers warned board of AI breakthrough ahead of CEO ouster   reuters.com/technology/sa... · Posted by u/mfiguiere
dougmwne · 2 years ago
This makes some sense to me. My experience with GPT is that it is capable of straightforward logical inference, but not more inspired thinking. It lacks the ability for a “eureka moment”. All complex inference it appears to have is a result of its training set. It is incapable of solving certain kinds of logic problems that a child would be able to solve.

As an example, take the wolf, goat, and cabbage problem, but change the names of the animals and the situation so that the axioms are intact, but the situation no longer seems similar to the classic problem, and therefore has no representation in the training data. GPT-4 can no longer solve this problem consistently.

If Q* can now solve problems like this reliably, it could represent a breakthrough in LLM’s ability to model the world and extrapolate beyond the training data.

malaya_zemlya · 2 years ago
Me: Solve the riddle: You have three fantastic animals: Aork, Bork, and Cork. If left unattended, Aork would eat Bork, and Bork would eat Cork. When you are with them, they behave and don't eat each other. You travel with these three animals and encounte a river with a boat. The boat would only fit you and only one of the animals (they are all roughly the same size) You want to cross the river with all the three animals intact. Solve the riddle, thinking step-by-step

ChatGPT: To solve this riddle, you must ensure that no animal gets eaten while you are transferring them across the river. Here's a step-by-step solution:

First Crossing: Take Bork across the river and leave him there. Return alone to the original side. At this point, Aork and Cork are on one side, and Bork is on the other. Bork cannot eat Cork because you are with Cork.

Second Crossing: Take Aork across the river. Now, Aork and Bork are on the far side, and Cork is on the original side. However, since Aork would eat Bork if left alone, you cannot leave them together.

Third Crossing: Take Bork back with you to the original side. Leave Bork there and take Cork with you across the river. Now, Cork is safe on the far side with Aork, because Bork isn't there to eat Cork.

Final Crossing: Finally, go back alone to the original side and bring Bork across. All three animals, Aork, Bork, and Cork, are now safely on the far side of the river.

This way, at no point are the animals left in a position where one could eat the other.

I think it does fine?

malaya_zemlya commented on Cryptographers solve decades-old privacy problem   nautil.us/cryptographers-... · Posted by u/Brajeshwar
malaya_zemlya · 2 years ago
Wouldn't ChatGPT in homomorphic encryption mode do something like that already? You put in a query - the system processes it in mysterious ways, and returns the answer in constant time.
malaya_zemlya commented on Approximate Nearest Neighbor Oh Yeah (Annoy)   zilliz.com/learn/approxim... · Posted by u/fzliu
smokracek · 2 years ago
Does anyone have any recommendations for a decent crash course on using vector DBs in conjuction with LLMs? I wanna do some experimentation with getting a model to comment on the similarity of data vectors etc. and I don't really know where to start.
malaya_zemlya · 2 years ago
deeplearning.ai has a short coursee on the topic https://www.deeplearning.ai/short-courses/large-language-mod...

u/malaya_zemlya

KarmaCake day182January 1, 2017View Original