• 4 Posts
  • 180 Comments
Joined 2 years ago
cake
Cake day: July 4th, 2023

help-circle
  • Which is fine for their store. But one of the things that used to make Android a more free ecosystem was that you could load apps from 3rd-party sites or stores, including stuff like F-Droid. Some of these apps do things that Google in particular won’t like - i.e. circumventing ads/analytics - so having them control who gets signing keys is not good





  • That’s kinda about power though. Think about going up a pulling a trailer up a hill with a vehicle that has a small engine versus a bigger one.

    The small engine vehicle might make the hill, but it’s going up gear lower, rev higher, and probably heat up a bit.

    The bigger vehicle will handle the hill and load with more grace, but may also use more fuel in everyday situations or cost more.

    BG3 is kinda stretching the Deck’s engine (APU), and the fans are running like made to compensate for the heat running at 100% for longer periods. I’ve a few games that stretch the Deck’s capabilities so for those I just stream from my more powerful PC


  • phx@lemmy.catoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 months ago

    Yup. It was more my thought that a low power over could produce sufficient results while requiring less resources. Something that can run on a desktop computer could still produce a database with reams of believable garbage that would take a lot of resources from the attacking AI to sort through, or otherwise corrupt its own harvested cache


  • phx@lemmy.catoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    20
    ·
    4 months ago

    Yeah that was my thought. Don’t reject them, that’s obvious and they’ll work around it. Feed them shit data - but not too obviously shit - and they’ll not only swallow it but eventually build up to levels where it compromises them.

    I’ve suggested the same for plain old non-AI data stealing. Make the data useless to them and cost more work to separate good from bad, and they’ll eventually either sod off or die.

    A low power AI actually seems like a good way to generate a ton of believable - but bad - data that can be used to fight the bad AI’s. It doesn’t need to be done real-time either as datasets can be generated in advance


  • Arch has a bit of a steeper learning curve. Ubuntu is probably the most “mainstream”, but I prefer Mint (based on Ubuntu) for some user-friendly changes. PopOS (already based on Ubuntu) is also supposed to be a bit more gaming centric if you’ve got an Nvidia card.

    I’ve got an AMD kit in my main machine and Nvidia/Intel in my laptop and both work fine with most Steam games using Proton.






  • No, we mean “sharing what they claim is their experience and details of such”

    Maybe they weren’t sharing addresses and SSN’s (though what’s stopping them from doing so), but like anything online it’s certainly not hard to make up, spin, or highly exaggerate a story to the detriment of the subject, but without them knowing about it.

    So yeah, even if Sally Smith claims that “**Billy Jones of 125 South Street is a big loser who has undisclosed herpes, which who knows how he got it with that small dick of his”, maybe the truth is that Billy refused to pay for an expensive meal on a first date it some other thing entirely.

    This isn’t turnabout (as the leak wasn’t intentional), and not abuse either, but it may be a bit karmic.

    ** Names and story entirely made up for example purposes


  • Uh… you can’t just “expose a LAN network to the Internet” in this manner. Local subnets aren’t routable over the Internet, so you can’t just enter 192.168.2.3 and end up on somebody else’s private LAN.

    https://www.geeksforgeeks.org/computer-networks/non-routable-address-space/

    They would have needed to either have all their internal devices being assigned public IP’s or had NAT+firewall rules explicitly routing ports from their outside address(es) to the inside ones. The former is unlikely as normally ISPs don’t allocate that many to a given client, or at least not by DHCP. the latter would require a specific configuration mapping the outside addresses/ports to inside devices, likely on a per device+port basis.

    Either your story is missing key details or you’ve misunderstood/made-up something.