• 0 Posts
  • 91 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle
  • That’s also just the electrical portion of our mind. There are whole levels of chemical, and chemical potentials at work. Neurones will fire differently depending on the chemical soup around them. Most of our moods are chemically based. E.g. adrenaline and testosterone making us more aggressive.

    Our mind also extends out of our heads. Organ transplant recipricants have noted personality changes. Food preferences being the most prevailant.

    The neurons only deal with ‘fast’ thinking. ‘slow’ thinking is far more complex and distributed.






  • cynar@lemmy.worldtoSelfhosted@lemmy.worldServer for a boat
    link
    fedilink
    English
    arrow-up
    17
    ·
    6 months ago

    Your best bet might be to use a laptop as the basis. They are already designed with power efficiency in mind, and you won’t need an external screen and keyboard for local problem solving.

    I would also consider having a raspberry pi 3 or similar as a companion. Services that must be up all the time run on the pi (e.g. network admin). The main computer only gets kicked out of sleep mode when required. The pi 3 needs less power than the newer pis, while still having enough computing power to not lag unless pushed hard.

    I definitely agree with SSDs. HDDs don’t do well when rotated when running. Boats are less than a stable platform.




  • The consensus in the trans community is to let a potential partner know earlier, rather than later. It avoids the situation you’ve encountered. Some men also can react violently, when they find out, so it’s quite a critical dilemma to them.

    Unfortunately, not all follow that mindset. They also tend to bust out a lot, and so lead a lot of men on.

    It’s a bit like the scumbag dilemma women face. Very few men are scumbags, yet women encounter them regularly when dating. Most men try not to annoy the women they find attractive. They are careful in their approach mentality. This means they only make a few approaches (relatively). They also tend to pair off, and so exit the pool. Scumbags cast a wide net, and don’t hang on to women for long. This means they make a LOT of approaches, and so annoy a vastly disproportionate number of women.

    Basically most trans people try to be as polite and careful about it as possible. A few, unfortunately, can destroy the reputation of the rest by being scumbags about it, at least locally.





  • It’s not too bad. Relativity says that no frame of reference is special.

    • On earth, a second looks like a second, but a second on the moon looks too quick.

    • On the moon, the second looks like a second, but a second on earth looks too slow.

    Both are actually correct. The simplest solution is to declare 1 to be the base reference. In this case, the earth second. Any lunar colonies will just have to accept that their second is slightly longer than they think it should be.

    If it helps, the difference is tiny. A second is 6.5x10^-10 seconds longer. This works out to 56 microseconds per 24 hours. It won’t affect much for a long time. About the only thing affected would be a lunar GPS.




  • One of the key thing that LLMs lack is a knowledge layer. In many ways, modern LLMs are hyper advanced predictive text. Don’t get me wrong, what they produce is awesome and can be extremely useful, but it’s still fundamentally limited.

    Ultimately, a useful AI will need some level of understanding. It will need to be able to switch between casual chatter, and information delivery. It will need to be able to crosscheck its own conclusions before delivering them. There are groups working on this, but they are quite a bit behind LLMs. When they catch up, and the 2 can be linked/combined then things will get VERY interesting!


  • An encryption scheme is only as strong as its weakest link. In academic terms, only the algorithm really matters. In the real world however, implementation is as important.

    The human element is an element that has to be considered. Rubber hose cryptanalysis is a tongue and cheek way of acknowledging that. It also matters since some algorithms are better at assisting here. E.g. 1 time key Vs passwords.


  • The purpose is to access the data. This is a bypass attack, rather than a mathematical one. It helps to remember that encryption is rarely used in the abstract. It is used as part of real world security.

    There are actually methods to defend against it. The most effective is a “duress key”. This is the key you give up under duress. It will decrypt an alternative version of the file/drive, as well as potentially triggering additional safeguards. The key point is the attacker won’t know if they have the real files, and there is nothing of interest, or dummy ones.


  • Hiding it would work. You just have to make sure you don’t miss any.

    As for the danger. There are levels of exposure. You could leak something damning, but that could be played off as a 1 off. You might also be sitting on a huge amount of paperwork that proves it’s endemic. That paperwork might also expose others who wanted things changed, but don’t want to be outed. In this case, an initial leak can test the waters. The additional info can be rolled out, if it’s needed, or the results justified.

    E.g. Initial leak proves they did something nasty. The additional info massively backs it up, but also implicates a VP in its gathering. You might not want to show that hand until later, either to protect them, or to gather more info on their reaction.


  • One of the less mentioned aspects is that a dead man switch should be difficult, if not impossible to detect and neutralise. If you are to the level of being unalived, you’re likely also a target for significant directed hacking. Such a dead man switch should be as resistant as possible to this. A simple email could let them detect and disable your dead man switch.