[ home / overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / lgbt / R9K / dead ] [ meta ][Options]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Flag
File
Select/drop/paste files here
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble

| Catalog | Home

File (hide): 1690063465405.png ( 869.42 KB , 996x744 , alien.png )

[–]

 No.12318[Reply]>>12323

I made a wiki about unretarding technology and society. What do you think? https://www.tastyfish.cz/lrs/main.html
1 post omitted. Click to expand.
>>

 No.12320

>>12319
Dead links are articles I haven't written yet, they should appear as red. For countercomplex see http://countercomplex.blogspot.com/.
>>

 No.12323

>>12318
I read the section about licenses , and i still don't understand why you consider publicdomain CC0 licenses to be better than copy-left and FOSS licenses.

Wasn't FOSS and copy-left created specifically because it was possible to modify public domain works and then close off the modified version.
>>

 No.12505

I see a blank web page and can't even rightclick -> view source.
Is this spam?
>>

 No.13376

Me like


File (hide): 1739779429479.png ( 720.59 KB , 1080x1055 , 1739736531818509.png )

[–]

 No.13371[Reply]>>13373

The irc and the matrix down for anyone else or is it just me? Zero fix the irc I am scared.
>>

 No.13372

I made a post here >>>/meta/11897 just now. I'm still looking into it.
>>

 No.13373

>>13371
Okay it should be fixed now


File (hide): 1739535273817.jpg ( 6.07 KB , 204x192 , Unbenannt.jpg )

[–]

 No.13365[Reply]

Who else uses RetroShare? Lets change IDs, here is mine: ABATxeFjmzv8pgGufEl3IT6TAxTfwbjsCaLHZ+biHt803TDGPDGXMgEGa2xvcHBvkEIAAAAEAApyZXRyb2JhbmhhcTJ6eHpvMmo0 M3FzYW5icXlvYm5sYXVqanh5eHFkenlkY3Vzb2E1NXpxLmIzMi5pMnAEAy1eVw==
>>

 No.13366

forgot to tell that it is over I2p, only
>>

 No.13367

File (hide): 1739559555758.jpg ( 184.96 KB , 1242x1092 , aupxq6mgrp251.jpg )

Yo this program is cool!

Add me up

ABDLMfpspD4l+lNrIyRvJqy7AxQk7E2eN/O4zDCw2/tp5ULtSOTm2AEGcG9vXzIykEIAAAAEAApkemZzaGplbnp4anh2d2trb2xl
c2VtNm5pNHduemFsN2RwZmljd212bW02NnZ1cjNwZ2dhLmIzMi5pMnAEA6Fl6Q==

I got this working with i2pd, let me know if anyone is having trouble!
>>

 No.13368>>13369

great! add me, too, please


ABDsbkCPRyGWb9+8AhKQVhiEAxS4w6eI4rfD6x+TN+POaViiYB2X6wEKQmlmaVJhbmdlcpBCAAAABKEGcmV0cm9zaDZscnN4NHB5
ajV6em1tdmJ4d3JmdHl5cmU0eGtnM2RrZXd1d3dyeWJkdnJoYS5iMzIuaTJwBANIz0A=

A tutorial on how to set it up is here:
https://retroshare.readthedocs.io/en/latest/tutorial/i2p-hidden-rs-node/
>>

 No.13369

>>13368
Another tutorial if you use i2pd (I followed this):

https://i2pd.readthedocs.io/en/latest/tutorials/retroshare/


[–]

 No.13328[Reply]

I DON'T HAVE ANY SMOKING GUN EVIDENCE BUT I INSTINCTUALLY KNOW IT IS HAPPENING. FALSEFLAGGING GAMES AS VIRUSES, TELLING ME MY DOCUMENT IS/ISN'T CORRUPTED BASED ON THE TEXT EDITOR I OPEN IT WITH, MY COPY OF MTPAINT HAS TOTALLY DISAPPEARED BUT RE-APPEARS SOMETIMES. MY PROPERIETARY PROGRAMS ARE ALWAYS OFFERED TO ME AHEAD OF FOSS AS CHOICES. PROPEITARY PROGRAMS WORKING SUSPICIOUSLY FASTER THAN THEY SHOULD BE AS IF THEY ARE BEING PUSHED TO BE FASTER. THIS COMPUTER OTHERWISE WORKS FINE. THERE ARE NEFARIOUS FORCES TRYING TO MANIPULATE ME TOWARDS ANTI-FOSS OPINIONS BY SABOTAGING/IMPROVING PERFORMANCE. DOCUMENT SAVES BETTER AFTER REMOVING MENTIONS OF NUKES TYPE SHIT.
6 posts omitted. Click to expand.
>>

 No.13358

File (hide): 1739264939919-0.jpg ( 40.73 KB , 500x490 , 1552249130889.jpg )

File (hide): 1739264939919-1.jpeg ( 82.82 KB , 1125x648 , Tcu2cDN.jpeg )

File (hide): 1739264939919-2.png ( 1.25 MB , 1280x1024 , netty3.png )

File (hide): 1739264939919-3.gif ( 967.78 KB , 478x268 , tenor.gif )

>>13335
I WILL NEVER STOP USING ALL CAPS UNLESS I AM FEELING LAZY THEN I WILL TYPE IN PROPER ENGLISH. CAPS LOCK NEEDS TO BE INSTITUTED WORLDWIDE BECAUSE HUMANITY IS HEADED TOWRADS AN ALWAYS LOWERCASE FUTURE. THAT IS WAY WORSE. ALWAYS CAPITALIZED IS FAR BETTER THAN ALWAYS USING SMALL LETTERS.

I MANAGED TO GET MY OLD LAPTOP WITH LINUX MINT WORKING AGAIN, SO I DON'T NEED TO USE MY FATHER'S COMPUTER. HOWEVER I AM USING A PLUGGED IN KEYBOARD BECAUSE THE BUILT IN KEYS ARE BROKEN. ALSO THE CHARGER I BOUGHT IS TUNED IN AT THE TOTALLY WRONG VOLTAGE I HAVE NO IDEA WHAT THAT WILL CAUSE IN THE FAR FUTURE.

BUT YOU COULD SAY THAT THE PROBLEMS THIS THREAD WAS CREATED FOR ARE FIXED IN THE SENSE I AM NO LONGER NEED TO FACE THEM. MY FATHER CAN NOW MAKE VIRTUAL DJ REMIXES 247.

THANKS TO ALL PEOPLE THAT GAVE ADVICE.
>>

 No.13359>>13360

RUNNING SIMULATIONS OF WHAT WOULD HAPPEN IF VARIOUS AMERICAN CITIES GOT NUKED FELT MEAN SO I SCRAPPED THE IDEA. AMERICA HAS 7000 NUKES AVAILABLE TO RETALIATE WITH AND THE RADIATION WILL FUCK UP THE CITIZENS OF INNOCENT NATIONS
>>

 No.13360>>13361

File (hide): 1739271768999.mp4 ( Spoiler Image, 5.57 MB , 426x240 , Fifth International Posadi….mp4 ) [play once] [loop]

>>13359
That's funny
I just ran a simulation myself
>>

 No.13361>>13362

>>13360
THAT'S COOL
>>

 No.13362

>>13361
Everything gonna be alrite


File (hide): 1729773546157.png ( 45.61 KB , 639x640 , tux-sad.png )

[–]

 No.13245[Reply]

Well it looks like the United States and NATO finally figured out a way to sabotage the Linux kernel. Several Russian kernel developers have just had their contributions removed and their kernel contributor status revoked due to being on the receiving end of US economic sanctions.

https://lwn.net/Articles/995186/

Torvalds himself is playing along with this enthusiastically because of his own moronic Finnish national politics. This is an extremely concerning development that affects all of free software. If this can happen to the Linux kernel it can happen to any other libre software projecting, poisoning the entire concept of international software development.
53 posts and 1 image reply omitted. Click to expand.
>>

 No.13353>>13355>>13356

File (hide): 1738560541131.png ( 193.86 KB , 900x672 , sadlain.png )

>>13351
<3. Avoid Two-Way Engagement
<Reviewing an unsolicited patch from a contributor in a sanctioned region should generally be fine, but actively engaging them to better understand their issue, diagnose the problem, or help improve a patch or modify code would likely cross the line. If the contributor is linked to a sanctioned entity or region, in general, it is best to keep communications strictly one-way. If a patch is received and you improve it and submit it upstream, that should be fine, but going back and forth in communications with the SDN developer likely would not.
<4. Avoid Contributions Enabling SDNs
<Accepting unsolicited patches that fix general issues in your open source project should be okay. However, if the changes directly benefit a restricted party’s products or services, it could be a problem. For example, if a developer from AcmeSDN (and AcmeSDN is an SDN subject to OFAC sanctions) contributes a driver that enables the AcmeSDN processor to work in your software, that contribution would likely be an issue. Think carefully not just about the source code, but the impact of these unsolicited patches.
<5. Avoid Indirect Contributions
<Sanctioned entities might try to contribute indirectly through third parties or developers acting "individually." Developers should understand other contributors' affiliations and raise any concerns with their community and legal counsel. For example, if in the prior example, AcmeSDN paid a developer in a country not subject to sanctions to make the driver contribution enabling AcmeSDN’s processor, that would still likely be an issue. A common pattern is that an SDN’s developer is blocked from making a contribution, but then a very similar (or the same) patch is submitted to the project from another account or email address. It could be an anonymous email account. Just because the contributor has been obfuscated does not change an assessment of the situation.
So basically the sanctions are placing an enormous burden on libre projects to both a) keep extreme track of the identity and national origin of contributors in order to avoid the wrongPost too long. Click here to view the full text.
>>

 No.13354

>>13351
been reading this, it seems that the "OhFuck" sanctions, mean that everybody can use each others code, but devs aren't allowed to talk directly to each other anymore, they have to talk past each other. Bunch of confusing shit.
>>

 No.13355

>>13353
I don't see why this is such a big deal. Can't we just move to an open source repo or something?
>>

 No.13356

>>13353
>keep extreme track of the identity and national origin of contributors in order to avoid the wrong ones, making software projects about people instead of the software
Yeah that's the difference between technical people and non-technical people.
Technical people absolutely despise this kind of "personality drama", the reaction to this will be: there are no people, there's only code
>>

 No.13357

I'm so angry at how little attention this controversy is getting in other places of libre software enthusiasm.


File (hide): 1738108997917.png ( 10.61 KB , 339x202 , ClipboardImage.png )

[–]

 No.13348[Reply]>>13349

Yeah this shit works better than my paid chatgpt account, what else is there to say?
>>

 No.13349

File (hide): 1738116879920.png ( 2.35 KB , 405x316 , deepseek.png )

>>13348
>what else is there to say?
Apparently deep-seek caused a big sell-off in tech stocks. There's a lot of speculation on that. Mine is that it proved that the big players aren't the only game in town, and that new competition can emerge, and that the trend probably goes towards commodity AI rather than siloed monopoly rent AI.

Deepseek being open source is also nice.

With it being a pure reinforcement learning design it doesn't need fine tuning and that's probably why it only cost like 6 million to make.

If you want to run the big boy model with 600+ billion parameters you need like 405 gigabyte of memory preferably speedy video memory. Graphics cards need an entire order of magnitude increase in video memory capacity. The 8-16 gigs on consumer cards and the 24-48ish gigs on profesh cards doesn't cut it anymore. Maybe this is finally whats going to cause mainstream PCBdesing to incorporate optical data-lanes.


File (hide): 1677265486701.jpg ( 51.35 KB , 351x356 , Foss AI.jpg )

[–]

 No.11956[Reply]

Recently there has been a lot of commotion around large language model text based AI.
They are able to do impressive stuff, they give useful answers, and even can write somewhat usable programming sample code.

The most famous one currently is chatgpt, but all of those AIs are basically black boxes, that probably have some malicious features under the hood.

While there are Open-Source Implementations of ChatGPT style Training Algorithms
https://www.infoq.com/news/2023/01/open-source-chatgpt/
Those kinda require that you have a sizeable gpu cluster like 500 $1k cards that are specialized kit, not your standard gaming stuff. To chew through large language-models with 100 billion to 500 billion parameters.

The biggest computational effort is the initial training run, that chews through a huge training data-set. After that is done, just running the thing to respond to your queries is easier.

So whats the path to a foss philosophy ethical AI ?
Should people do something like peer to peer network where they connect computers together to distribute the computational effort to many people ?

Or should people go for reducing the functionality until it can run on a normal computer ?
Post too long. Click here to view the full text.
16 posts and 6 image replies omitted. Click to expand.
>>

 No.13054

[Embed]
The Hated One made a good and brief vid about big tech lobbies trying to kill Open source AI because bigtech can't compete with the open stuff on cost efficiency. His take is to go bug your political representatives to not let big tech hord all the AI-tech for it self.

My question is, could the tech monopolies really block Opensource AI ?

Can't the computer wizards just go to some other country and ask for opensource friendly regulations. That country could import a massive tech-boom for free. Possibly even get better AI. It's not like this is huge immobile industrial technology.

https://farside.link/invidious/watch?v=5NUD7rdbCm8
>>

 No.13304>>13306

File (hide): 1731261509996.pdf ( 1.09 MB , 67x118 , face ATTENDANCE.pdf )

>>

 No.13306

>>13304
> face ATTENDANCE
Bio-metrics is a cyclical fad.

The very technology that enables you to detect a bio-metric feature also allows you to make fake duplicate, that circumvents it. It's conceptually flawed.
>>

 No.13310

https://github.com/hanweikung/face_anon_simple
Simple face exchange for anonymity
>>

 No.13339



File (hide): 1713556254414.jpg ( 47.96 KB , 750x364 , C__Data_Users_DefApps_AppD….jpg )

[–]

 No.12988[Reply]

The internet is dying, maybe it's actually already dead. This is a general thread about the dead internet theory. Share articles, first hand proof that the internet is dead, discuss etc. There is alot going on which indicates, that the dead internet theory is becoming reality.
25 posts and 2 image replies omitted. Click to expand.
>>

 No.13020

>>13019
https://archive.ph/20240422172830/https://www.wired.com/story/section-702-reauthorization-expansion/

>Legal experts—including a rare few attorneys who’ve argued cases before the FISA court in the past—say the new ECSP text ensnares owners of facilities housing equipment used to store and carry data, as well as commercial landlords and virtually anyone with access to communications equipment in those spaces. The text, they argue, may be interpreted by the government as granting it authority to compel the assistance of “delivery personnel, cleaning contractors, and utility providers,” among others.

How they can reconcile forcing normal people to become spies, is hard to fathom. Ethically and strategically, it sure is egregious, however abusing people like that, fosters malicious compliance.
>Criticism of the 702 program largely stems from revelations of abuse in a declassified court filing from 2022, which describes rampant misuse of the 702 database by the FBI. Investigators at the bureau have been caught unlawfully scouring 702 data for information on American protesters, journalists, and political donors.
This type of hard persecution is what kills the legitimacy.

>What's next for the internet?

it's hard to predict technological trends, a new counter strategy to surveillance extremism might be increasing data noise, if enough useless data clogs up the system, that might mitigate the harm it does.
>>

 No.13024>>13025

Good post by Kevin Gosztola on the recent history of domestic spying with a foreign pretext:
https://thedissenter.org/biden-expands-ranks-government-spies/

Seems like one of the aims of this bill is to go after Gaza genocide protestors by pretending they're Hamas.
>>

 No.13025

>>13024
>Seems like one of the aims of this bill is to go after Gaza genocide protestors by pretending they're Hamas.
Peak Zionism ended a while ago, the political pendulum had already begun swinging in the other direction. The Zionists going full retard with the mass-murdering are accelerating that process. And it's not just mass-politics that are changing, the militarized Zionism project is more trouble than it's worth in material terms as well. Soon everything tied to it will become politically tainted.
>>

 No.13026

https://noyb.eu/en/ag-cjeu-facebook-must-minimize-personal-data-ads-eu
Here's an interesting case about minimizing personal data collection and retention.

This ties in well with what i think the near future privacy politics will become, where people consider data related to people as analogous to some kind radioactive waste material.


File (hide): 1608526287100.png ( 32.83 KB , 432x432 , 1565502518003.png )

[–]

 No.4951[Reply][Last 50 Posts]

This Thread Has Been Re-appropriated for leftychan.net Usage.

General thread meant for the discussion of the mobile app for browsing leftypol.org, known as clover.

Releases can be found here:
https://github.com/PietroCarrara/Clover/releases/latest
245 posts and 36 image replies omitted. Click to expand.
>>

 No.12758>>12759

There's two major apps that we could use moving forward.
Blue Clover: https://nnuudev.github.io/BlueClover/
Kuroba-Ex: https://github.com/K1rakishou/Kuroba-Experimental

We were very close with Kuroba-Ex but the developer is a bit of a dick and asshole. Thus why I moved to Blue Clover.

Sauce: https://github.com/K1rakishou/Kuroba-Experimental/issues/780
>>

 No.12759

>>12758
based thank you
>>

 No.13296>>13297>>13298

Since leftypol has been added to kurobaEx, would it be difficult to fork it and add leftychan?
>>

 No.13297

>>13296
Why fork, why not just send in a compatibility for both patch?
>>

 No.13298

>>13296
You'll need two things:

- to find the pull request or commit where leftypol was added
- to be able to compile and test the app

For the first one you can look on github and for the second one you need to figure out how they build that app, are they using Android Studio? Idk anything about android development (or ios for that matter) but I'd download the source on github and open it in Android Studio and see what happens.


[Embed]
[–]

 No.13028[Reply]

Here is a thought experiment about a hard problem in auditing computer security
https://farside.link/invidious/watch?v=sOeuYuvOcl0

if you didn't watch it here's the tldr:
In principle it's possible to compromise enough of the existing software and hardware stack so that a intelligent enough malicious security flaw could hide it self from you no matter how hardcore you go with your security audit. The conclusion being drawn is that the only solution to making sure you have a clean system, is to start from scratch with basic logic circuitry and then slowly build up a trusted software and hardware stack.

It's a clever argument, but there is a much easier way to get around all of this.

You can get to a trusted stack simply by scrambling the logic of a cpu. The only one that will be able to run logic operations on that cpu will be the person that can use the de-scrambler-key on the logic instructions given to that cpu. Malicious inserts into the hardware will return gibberish if they try to listen, and make the cpu produce logic errors if they try to inject code. It doesn't need to be a performant cpu either, something equivalent to 1985 era processors is good enough, as it's only necessary to bootstrap a trusted environment. A moderately sized organization can probably muster the necessary funds and technical sophistication to get a small batch of scrambled cpus produced.
>>

 No.13274>>13279

I'm not sure what you mean concretely by "scrambling the logic of a CPU". Do you mean to say that a key would be needed to load data into registers? Do you mean to say that a key is needed to know the instruction set? Are you referring to fully homomorphic encryption?

The other problem is that suppose this organization of yours can make "scrambled CPUs". How can the rest of us trust that organization? What's to stop some interested party from compromising it?
>>

 No.13279

>>13274
There is a philosophical question whether microchips can be something that has verifiable operations or whether it's doomed to be a black box. And here the answer is, yes it's possible to build a clean stack that is verifiable all the way down.

If you want to go as hardcore as the philosophical thought experiment you need to have an organization that starts from scratch with a clean-slate processor, that can be a super basic design and therefore it's plausible to do this in reality. Whether a nearly omnipotent opponent exists that requires this level of commitment, is another matter. The motivation for doing this would be more an exercise in scientific rigor and precision.

On the realistic side of things you would scramble a cpu design if you have to produce it in a fab that you don't want to trust. That is from the perspective of a cpu designer.

From the perspective of an end-user: the scramble interface could be exposed to end-users too, they could generate their own de-scrambler.


Delete Post [ ]
[ home / overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / lgbt / R9K / dead ] [ meta ]
[ 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 ]
| Catalog | Home