20 years? more like 5
20 years? more like 5
start with basics:
iperf
on every device you can between an external device and your internal host(s) and use it to find any bottleneckstcpdump
to analyze packets flowing over the network. you can often find surprising results this wayiperf
) with the most simple config (no nginx etc) and add the complexity of your config bit by bit until the issue returnsyou’re so close, just why exactly do you think people are using it for these things it’s not meant for?
because every company, every CEO, every VP, is pushing every sector of their companies to adopt AI no matter what.
most actual people understand the limitations you list, but it’s the capitalists at the table that are making AI show up where it’s not wanted
TLS doesn’t encrypt the host name of the urls you are visiting and DNS traffic is insanely easy to sniff even if you aren’t using your ISPs service.
babe wake up, a new bone-apple-tea just dropped
just a guess, but in order for an LLM to generate or draw anything it needs source material in the form of training data. For copyrighted characters this would mean OpenAI would be willingly feeding their LLM copyrighted images which would likely open them up to legal action.
“every situation you’re involved in is 10X more escalated than it needs to be because a gun is involved at all”
absolutely delusional, please explain how a vulnerable individual concealed carrying is escalating anything.
jfc what an absolute hellhole of a police state you’ve dreamt up. so many of your hairbrained ideas amount to “cops should have unlimited access to your private life”. how exactly do you think this would play out given the US and it’s systemic racism and classism?
yeah silly me for supporting artists with my money but also downloading drm-free copies of things so I can actually exercise a semblance of ownership. but sure, keelhaul me so you can keep your sense of smug superiority.
AI is a tool that is fundamentally based on the concept of theft and plagiarism. The LLM training data comes from artists and creators that did not consent to their work being plagiarized by a hallucinating machine.
yes, and where does the Gun Violence Archive get their numbers?
looking at their site, the answer is “themselves”… cool. Looking through their listed data it clearly includes gun violence from gang activity.
yes I know, I mentioned that in my comment. can you tell me where on that page it indicates their source of data?
your source links to this source of data, which only goes up to 2021. The table clearly states they’re counting 15 - 19 year olds.
that 6,192 number appears to come from the gunviolencearchive site, but I don’t see any source for their data other than claims that “suicide data provided by CDC”
further, a simple search of the claim “guns number one cause of death in children” will find a lot of valid critiques of this claim.
this is false, this stat deliberately counts 18 and 19 year olds as “children” and purposefully includes gang related violence. great example of using statistics to sell a story.
how many gang members are going to surrender their firearms after a ban?
a decentralized community that correctly prioritizes security would absolutely be using signed commits and other web-of-trust security practices to prevent this sort of problem
you understand there’s more than one way to have an economy right? that there’s more than one way for labor to be rewarded for its output?
saying “our economic system needs to end” has nothing to do with what you wrote
SMS is literally the bottom of the barrel though
deleted by creator
and it’s also why the propaganda machine always pushes the “violence is not the answer” narrative
a surprisingly disappointing article from ars, i expect better from them.
the author appears to be confusing “relay attacks” with “cloning” and doesn’t really explain the flow of the attach that well.
really this just sounds like a complicated MitM attack, using the victim’s phone as the “middle” component between the victim’s physical card and the attacker’s rooted phone.
the whole “cloning the UID attack” at the end of the article is irrelevant, NFC payment cards don’t work like that.