You fucking imbecile. If women are locked in the bedroom how can they make dinner?? Moran
You fucking imbecile. If women are locked in the bedroom how can they make dinner?? Moran
Banks hate this simple trick
Blowing up? Seen conservative discussion areas? Their godking is not only one of the working class now, but he owned all the democrats and made Harris look like a fool. He’s a master troll doing 4d chess!
They built a space laser?
It’s a watch that says you have no taste.
They know their target demographic
Careful, if you spend 8 hours playing with your deck you might go blind
Hah. Snake oil vendors will still sell snake oil, CEO will still be dazzled by fancy dinners and fast talking salesmen, and IT will still be tasked with keeping the crap running.
This has a lot of “I can use the bus perfectly fine for my needs, so we should outlaw cars” energy to it.
There are several systems, like firewalls , switches, routers, proprietary systems and so on that only has a manual process for updating, that can’t be easily automated.
Most phones these days use randomized MACs
https://www.guidingtech.com/what-is-mac-randomization-and-how-to-use-it-on-your-devices/
Not sure if that is for BT too, but looks like there is some support for it in the standards
https://novelbits.io/how-to-protect-the-privacy-of-your-bluetooth-low-energy-device/
https://novelbits.io/bluetooth-address-privacy-ble/
The recommendation per the Bluetooth specification is to have it change every 15 minutes (this is evident in all iOS devices).
So seems like it is implemented on some phones at least
https://www.bluetooth.com/blog/bluetooth-technology-protecting-your-privacy/
From 2015. So this seems to be a solved problem for a decade now
That’s because they don’t see the letters, but tokens instead. A token can be one letter, but is usually bigger. So what the llm sees might be something like
When seeing it like that it’s more obvious why the llm’s are struggling with it
In many cases the key exchange (kex) for symmetric ciphers are done using slower asymmetric ciphers. Many of which are vulnerable to quantum algos to various degrees.
So even when attacking AES you’d ideally do it indirectly by targeting the kex.
I generally agree with your comment, but not on this part:
parroting the responses to questions that already existed in their input.
They’re quite capable of following instructions over data where neither the instruction nor the data was anywhere in the training data.
They’re completely incapable of critical thought or even basic reasoning.
Critical thought, generally no. Basic reasoning, that they’re somewhat capable of. And chain of thought amplifies what little is there.
Like when under Arab spring the Egyptian politicians tried to get the military involved to stop the protests, and got back (paraphrased)
“Our primary job is to protect the Egyptian people from violence. You really don’t want us involved in this”
Sounds a bit like worldwar series by Harry Turtledove
If I go to a restaurant and order risotto, I haven’t made the dish, I’ve only consumed it. I want you to focus on that word “consume”, it’s important here.
If I buy a bread at the bakery, ham and cheese in the grocery store, and make me a sandwich, who’s the creator?
Hmm… what about pendulum painting? Where you put paint in a bucket, put a hole in it, and let it swing back and forth over the canvas?
On one side he chooses paint and size of hole and initial path and so on, but on the other hand he let nature and physics do the actual painting for him.
AI can be art. And you’re like the people criticizing the first photographers saying what they did wasn’t art. This is what I think.
And it’s going to have to be okay.
And woman a combatant factory?
Or a few more gb of LLM?