

LLMs, image generators like Stable Diffusion etc, and other of what’s come lately to be called “generative AI” should have no place on the Fediverse or anywhere else.
LLMs, image generators like Stable Diffusion etc, and other of what’s come lately to be called “generative AI” should have no place on the Fediverse or anywhere else.
“They’re taking the Hobbits to Dagobah.”
Reverse-engineer it and build an unlimited-use portal gun, of course!
I was always one of the youngest in my class. My birthday is very late in the year. I also graduated high school a year early and entered college while I was still technically 16. I got the occasional joke/comment about not being able to drink until I was a senior in college.
It’s not too late. He can still turn from his sin and accept Satan into his heart. Or more importantly, his lungs.
This is the top post in my feed right now. I haven’t scrolled at all yet.
…what’s further down?
It should be illegal for a video like that to exist without showing it firing.
But the bonus to AC is so nice…
You’re the expert!
How much pig would a guinea pig guinea if a guinea pig could guinea pigs?
We summon the great demon king Asmeowdeus to teach us how to use can openers!
I once tasked the AI DeepSeek
The building of a distro to achieve
With while true ; do beep ; done
As PID 1
AI dubbed the poor distro “Kill Me”
Wait, is this an interview?
I’d be… uh… a t-rex… because, uh… I’m not afraid to… uh… take initiative?
Nice! Thanks for clarifying that. It definitely puts some of the hypotheses to rest. I imagine some of the people saying it was staged were just too swept up in the AI bubble hype to admit to themselves or others that their Lord and Savior Generative AI could be so dumb as to do that sort of thing without a human faking it.
Sure, but LLMs are also sufficiently prone to spontaneously doing weird stuff like that that it’s very believable that it’s authentic/organic. And there’s definitely Python code in Gemini’s training data.
I don’t think this is Gemini trying to run some of its own code to save facts about the user and whoops displaying the code it was trying to run to the user rather than running it or anything like that. That’s not how software works, and not how LLMs work.
More likely somewhere in Gemini’s training data, there’s one or more code examples (specifically Python code examples, by the looks of it) that have something to do with the user’s prompt. The relationship between Python code examples and the user’s prompt may well be extremely nonobvious, but there’d have to be something about the prompt that made Gemini hallucinate that.
Source: Am software engineer. Though I don’t have any hands-on experience with generative AI to speak of. I do think generative AI is a bullshit hype bubble, though.
Does it really do any good for the drive to be encrypted if it doesn’t require a password (or Yubikey or retinal scan or other authentication factor) on boot? If you’re just going to put the plaintext key/password on the same drive but in a partition that’s not encrypted, there’s no point encrypting the drive, right?
So maybe “it asks for a password on boot” is more of a “works as intended” thing?
How will I access the encrypted devices after installation? (System Startup) During system startup you will be presented with a passphrase prompt. …
The quote above is from Fedora documentation here
This is your root FS that’s encrypted that we’re talking about, correct?
If you really want an encrypted root but no password on boot and the plaintext decryption password/key on the same drive, there are ways to do it. (It would probably require customizing the initramfs somehow. But it’s Linux, and Linux certainly isn’t going to prevent you from doing such things. Just try to dissuade you.)
If we’re not talking about a root filesystem, that would likely change some things. If it’s Luks, I’m pretty sure it wouldn’t matter particularly where on your filesystem the key was so long as your /etc/crypttab refers to it. I’d say that sort of setup would probably only provide additional security if the encrypted drive is an external drive that you might worry could be stolen or physically accessed when the attacker doesn’t have physical access to your root filesystem.
Also, if you shared what encryption scheme was in use (Luks, Anaconda, etc), that would probably help as well.
Edit: Ah. Ok. You gave more info while I was typing the above response. What you want is unlocking via ssh. For sure.
Read the rest of the comments in this post. There are multiple ways he could, theoretically, and it’s not unlikely he’ll try.
It’s like appeasement again only worse, because at least the motivation for appeasement was ostensibly to avoid conflict.