

They’re probably not joking, TOX IDs are like that. :) Mine is:
CA9A4C1968AA38CC93CB32F31F3682AB897ABA42C90E6F0EA5E1FB541930FD64138B4CC09AD*
(*the number opposite to the first is the number that comes after one, to hinder any spam bots)
They’re probably not joking, TOX IDs are like that. :) Mine is:
CA9A4C1968AA38CC93CB32F31F3682AB897ABA42C90E6F0EA5E1FB541930FD64138B4CC09AD*
(*the number opposite to the first is the number that comes after one, to hinder any spam bots)
You can use Signal with a different client.
Can you advise, which one would be a good one? Because I actually use Signal too, it’s just misbehaving a lot recently.
I have had endless difficulties with Signal forcing upgrades on me and requiring to sign in on the phone, under threat of deactivating my account (I use it on a PC).
Commentary:
You’re linking to the Times of Israel. Since the news outlet operates in Israel, it is subject to censorship by the IDF, and they have chosen to use their power to censor the article and omit weapon types.
If you want information about assassinations of Iranian nuclear scientists, get their list from Wikipedia and google each of their names, looking for descriptions.
https://en.wikipedia.org/wiki/Assassinations_of_Iranian_nuclear_scientists
My guess: guided missile or drone strikes. All the assassinations happened at a time of Israeli air strikes over Iran. Whatever weapon was used, was deployed from airplanes. Given the high profile of the targets, Israeli intelligence agencies did their job this time (in Gaza, they seem to be feeding their troops low quality AI slop).
I will use the opportunity to remind that Signal is operated by a non-profit in the jurisdiction called “the US”. This could have implications.
A somewhat more anarchist option might be TOX. There is no single client, TOX is a protocol, you can choose from half a dozen clients. I personally use qTox.
Upside: no phone number required. No questions asked.
Downside: no servers to store and forward messages. You can talk if both parties are online.
On social media, putting the burden of blocking on a million users is naive because:
I have once helped others build an anonymous mix network (I2P). I’m also an anarchist. On Lemmy however, support decentralization, defederating from instances that have bad policies or corrupt management, and harsh moderation. Because the operator of a Lemmy instance is fully exposed.
Experience has shown that total freedom is a suitable policy for apps that support 1-to-1 conversations via short text messages. Everything else invites too much abuse. If it’s public, it will have rules. If it’s totally private, it can have total freedom.
In our modern times, Ea-Nasir still has some bars of aluminum to sell you. Quite several, in fact. :)
But who would buy such hardware? :)
so good luck hiding a VPN client.
In my imagination, there is no VPN client. The whole network is behind a VPN router and the internet gateway is where it needs to be.
how did you do it?
In the BIOS options of that specific server (nothing fancy, a generic Dell with some Xeon processor) the option to enable/disable ME was just plainly offered.
Chipset features > Intel AMT (active management technology) > disable (or something similar, my memory is a bit fuzzy). I researched the option, got worried about the outcomes if someone learned to exploit it, and made it a policy of turning it off. It was about 2 years ago.
P.S.
I’m sure there exist tools for the really security-conscious folks to verify whether ME has become disabled, but I was installing a boring warehouse system, so I didn’t check.
please read up on intel management engine
I’m already familiar with it. On the systems I buy and intall, if they are Intel based, ME gets disabled since I haven’t found a reasonable use for it.
Oh yeah, ARM also has something similar.
Since this is more relevant to me (numerically, most of the systems that I install are Raspberry Pi based robots), I’m happy to announce that TrustZone is not supported on Pi 4 (I haven’t checked about other models). I haven’t tested, however - don’t trust my word.
Who would you buy from in this case?
From the Raspberry Pi Foundation, who are doubtless ordering silicon from TSMC for the Pico series and ready-made CPUs for their bigger products, and various other services from other companies. If they didn’t exist, I would likely fall back on RockChip based products from China.
https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/index.htm
Wow. :) Neat trick. (Would be revealed in competent hands, though. Snap an X-ray photo and find excess electronics in the socket.)
However, a radio transceiver is an extremely poor candidate for embedding on a chip. It’s good for bugging boards, not chips.
The first and central provision of the bill is the requirement for tracking technology to be embedded in any high-end processor module or device that falls under the U.S. export restrictions.
As a coder with some hardware awareness, I find the concept laughable.
How does he think they (read: the Taiwanese, if they are willing to) would go about doing it?
Add a GPS receiver onto every GPU? Add an inertial navigation module to every GPU? Add a radio to every GPU? :D
The poor politician needs a technically competent advisor forced on him. To make him aware (preferably in the most blunt way) of real possibilities in the real world.
In the real world, you can prevent a chip from knowing where it’s running and you can’t add random shit onto a chip, and if someone does, you can stop buying bugged hardware or prevent that random addition from getting a reading.
Wait until you happen to visit to Risti, Estonia, where a mast named Soorebane inhabits an intersection of some country roads. :)
Of course, it’s an artsy decorative exception for where a high voltage line must cross through a public place. In all other places, ordinary lattice grid masts.
I think Elon was having the opposite kind of problems, with Grok not validating its users nearly enough, despite Elon instructing employees to make it so. :)
From the article (emphasis mine):
Having read his chat logs, she only found that the AI was “talking to him as if he is the next messiah.” The replies to her story were full of similar anecdotes about loved ones suddenly falling down rabbit holes of spiritual mania, supernatural delusion, and arcane prophecy — all of it fueled by AI. Some came to believe they had been chosen for a sacred mission of revelation, others that they had conjured true sentience from the software.
/…/
“It would tell him everything he said was beautiful, cosmic, groundbreaking,” she says.
From elsewhere:
Sycophancy in GPT-4o: What happened and what we’re doing about it
We have rolled back last week’s GPT‑4o update in ChatGPT so people are now using an earlier version with more balanced behavior. The update we removed was overly flattering or agreeable—often described as sycophantic.
I don’t know what large language model these people used, but evidence of some language models exhibiting response patterns that people interpret as sycophantic (praising or encouraging the user needlessly) is not new. Neither is hallucinatory behaviour.
Apparently, people who are susceptible and close to falling over the edge, may end up pushing themselves over the edge with AI assistance.
What I suspect: someone has trained their LLM on somethig like religious literature, fiction about religious experiences, or descriptions of religious experiences. If the AI is suitably prompted, it can re-enact such scenarios in text, while adapting the experience to the user at least somewhat. To a person susceptible to religious illusions (and let’s not deny it, people are suscpecptible to finding deep meaning and purpose with shallow evidence), apparently an LLM can play the role of an indoctrinating co-believer, indoctrinating prophet or supportive follower.
Realizing that they reproduce via parthenogenesis, and this involves laying eggs, I think the appropriate title would be “she big, she attac”. :)
It’s a strange species. Common ancestor around 1988.
The University of Zurich’s ethics board—which can offer researchers advice but, according to the university, lacks the power to reject studies that fall short of its standards—told the researchers before they began posting that “the participants should be informed as much as possible,” according to the university statement I received. But the researchers seem to believe that doing so would have ruined the experiment. “To ethically test LLMs’ persuasive power in realistic scenarios, an unaware setting was necessary,” because it more realistically mimics how people would respond to unidentified bad actors in real-world settings, the researchers wrote in one of their Reddit comments.
This seems to be the kind of a situation where, if the researchers truly believe their study is necessary, they have to:
After that, if they still feel their study is necesary, maybe they should run it and publish the results.
If then, some eager redditors start sending death threats, that’s unfortunate. I would catalouge them, but not report them anywhere unless something actually happens.
As for the question of whether a tailor-made response considering someone’s background can sway opinions better - that’s been obvious through ages of diplomacy. (If you approach an influential person with a weighty proposal, it has always been worthwhile to know their background, think of several ways of how they might perceive the proposal, and advance your explanation in a way that relates better with their viewpoint.)
AI bots which take into consideration a person’s background will - if implemented right - indeed be more powerful at swaying opinions.
As to whether secrecy was really needed - the article points to other studies which apparently managed to prove the persuasive capability of AI bots without deception and secrecy. So maybe it wasn’t needed after all.
I really like to build from zero, but some things are better copied, no matter if you fully understand them or fall short. :)
For example, I’m not qualified to check if Hamilton and Euler were correct - I only do as they explained, and later double-check the output against input.
Wow, interesting. :)
Not unexpectedly, the LLM failed to explain its own thought process correctly.
I’m not from the US, but I straight out recommend quickly educating oneself about military stuff at this point - about fiber guided drones (here in Eastern Europe we like them) and remote weapons stations (we like those too). Because the US is heading somewhere at a rapid pace. Let’s hope it won’t get there (the simplest and most civil obstacle would be lots of court cases and Trumpists losing midterm elections), but if it does, then strongly worded letters will not suffice.
Trump’s administration:
“Agency,” unless otherwise indicated, means any authority of the United States that is an “agency” under 44 U.S.C. 3502(1), and shall also include the Federal Election Commission.
Vance, in his old interviews:
“I think that what Trump should do, if I was giving him one piece of advice: Fire every single midlevel bureaucrat, every civil servant in the administrative state, replace them with our people.”
Also Vance:
“We are in a late republican period,” Vance said later, evoking the common New Right view of America as Rome awaiting its Caesar. “If we’re going to push back against it, we’re going to have to get pretty wild, and pretty far out there, and go in directions that a lot of conservatives right now are uncomfortable with.”
Googling “how to remove a dictator?” when you already have one is doing it too late. On the day the self-admitted wannabe Caesar crosses his Rubicon, it better be so that some people already know what to aim at him.
Tesla dealerships… nah. I would not advise spending energy on them. But people, being only people, get emotional and do that kind of things.
As an exception to most regulations that we hear about from China, this approach actually seems well considered - something that might benefit people and work.
Similar regulations should be considered by other countries. Labeling generated content at the source, hopefully without the metadata being too extensive (this is where China might go off the handle) would help avoid at least two things:
Technical summary: it seems OK against an observer who can see the network traffic but hasn’t infiltrated the phone of the source or the computer of the news organization.