• 0 Posts
  • 50 Comments
Joined 2 years ago
cake
Cake day: June 15th, 2023

help-circle

  • The problem with any excuse you make for Elon is that Elon is too stupid to keep his mouth shut and give the excuse any plausibility. After the nazi salute he went on Twitter to make nazi puns about it. It is certain beyond reasonable doubt that he knows exactly what the salute was. Even if you give him the insane benefit of the doubt that it was really “his heart going out” and accidentally looked like the salute, his having shown he knows what it looks like but never stating he does not actually believe in the ideology or want present himself as an ally to nazis is just as damning.






  • Well it’s not going to be the same engineering challenge as it was for Valve, because they only need to integrate proton, not develop it. If proton works on Lutris (via umu), an open source project with no corporate backing as far as I’m aware, surely CDPR can at least attempt it. This is probably the best time to do it, too. SteamOS has been well received and is likely to end up on even more handhelds, and Windows 10 is nearing its EoL. If GoG is one of the first storefronts to allow its users to play outside of windows it might generate a lot of positive sentiment in the community, just like they did with their anti-DRM stance.





  • The DMCA takedown seems to be specifically about Ryujinx’s ability to decode ROMs. Circumventing DRM is in fact illegal according to the DMCA so they appear to have a valid argument. However, in their takedown notice they assume that the decryption keys are obtained illegally. I’m wondering if the DMCA forbids extracting the decryption keys (without distribution) from your own legitimately owned Nintendo hardware for personal backup. If so, then the Ryujinx feature might also be defensible.

    This also raises the question of whether an emulator could be made to work on already decrypted media and let you figure out how to do that yourself. Nintendo could argue that its main use is still to play illegally decrypted ROMs but the emulator would have a decent defense imo.



  • This is really funny to me. If you keep optimizing this process you’ll eventually completely remove the AI parts. Really shows how some of the pains AI claims to solve are self-inflicted. A good UI would have allowed the user to make this transaction in the same time it took to give the AI its initial instructions.

    On this topic, here’s another common anti-pattern that I’m waiting for people to realize is insane and do something about it:

    • person A needs to convey an idea/proposal
    • they write a short but complete technical specification for it
    • it doesn’t comply with some arbitrary standard/expectation so they tell an AI to expand the text
    • the AI can’t add any real information, it just spreads the same information over more text
    • person B receives the text and is annoyed at how verbose it is
    • they tell an AI to summarize it
    • they get something that basically aims to be the original text, but it’s been passed through an unreliable hallucinating energy-inefficient channel

    Based on true stories.

    The above is not to say that every AI use case is made up or that the demo in the video isn’t cool. It’s also not a problem exclusive to AI. This is a more general observation that people don’t question the sanity of interfaces enough, even when it costs them a lot of extra work to comply with it.


  • It’s much more complicated than this. Given that models have been shown to spit out verbatim copies of some training material, it can be argued that the weights do in fact encode the material, just in some obfuscated way. Additionally, it can be argued that the output of the model is a derivative copy of the original work regardless of whether the original work can be “found inside” the model weights, just by the nature of the process. As of now, there is no precedent that I know of on whether this constitutes redistribution of copyrighted material.







  • Do you have access to Signal servers to verify your claims by any chance?

    That’s not how it works. The signal protocol is designed in a way that the server can’t have access to your message contents if the client encrypts them properly. You’re supposed to assume the server might be compromised at any time. The parts you actually need to verify for safe communication are:

    • the code running on your device
    • the public key of your intended recipient