Readit News logoReadit News

Loading parent story...

Loading comment...

Loading parent story...

Loading comment...

purkka commented on Grok 4 Fast   x.ai/news/grok-4-fast... · Posted by u/meetpateltech
barrell · 3 months ago
I would guess that it is essentially just a “grok 4 mini”, but if you use mini as the qualifier then most people will be inclined not to use it. If you call it fast then it gives people a reason to select it.
purkka · 3 months ago
Based on the various benchmarks linked here and in the OP, the name feels justifiable. "Mini" models tend to be a lot worse compared to the base model than this one seems to be.

Loading parent story...

Loading comment...

purkka commented on JOVE – Jonathan’s Own Version of Emacs   github.com/jonmacs/jove/... · Posted by u/nanna
purkka · 5 months ago
> Unlike GNU Emacs, JOVE does not support UTF-8.

If this is still true in the latest versions, I find it pretty amazing that something like this has been maintained all the way until 2023.

purkka commented on Debian bookworm live images now reproducible   lwn.net/Articles/1015402/... · Posted by u/bertman
imcritic · 9 months ago
I don't get how someone achieves reproducibility of builds: what about files metadata like creation/modification timestamps? Do they forge them? Or are these data treated as not important enough (like it 2 files with different metadata but identical contents should have the same checksum when hashed)?
purkka · 9 months ago
Generally, yes: https://reproducible-builds.org/docs/timestamps/

Since the build is reproducible, it should not matter when it was built. If you want to trace a build back to its source, there are much better ways than a timestamp.

purkka commented on Ask HN: How did the internet discover my subdomain?    · Posted by u/govideo
purkka · 10 months ago
"Security through obscurity" can definitely be defined in a meaningful way.

The opposite of "bad security through obscurity" is using completely public and standard mechanisms/protocols/algorithms such as TLS, PGP or pin tumbler locks. The security then comes from the keys and other secrets, which are chosen from the space permitted by the mechanism with sufficient entropy or other desirable properties.

The line is drawn between obscuring the mechanism, which is designed to have measurable security properties (cryptographic strength, enumeration prevention, lock security pins), and obscuring the keys that are essentially just random hidden information.

Obscuring the mechanism provides some security as well, sure, but a public mechanism can be publicly verified to provide security based only on secret keys.

Loading parent story...

Loading comment...

purkka commented on Museum of Bad Art   museumofbadart.org/... · Posted by u/purkka
purkka · a year ago
Came across this today. Especially the collection highlights on Wikipedia [0] really made my day.

[0]: https://en.wikipedia.org/wiki/Museum_of_Bad_Art#Collection_h...

u/purkka

KarmaCake day367June 8, 2021
About
Infosec, hardware & programming. https://purkka.codes/
View Original