• 12 Posts
  • 237 Comments
Joined 2 years ago
cake
Cake day: July 4th, 2023

help-circle




  • MTK@lemmy.worldtoPrivacy@lemmy.mlI made a gpg Hat
    link
    fedilink
    arrow-up
    26
    ·
    edit-2
    3 days ago

    Put an nfc tag there, you can insert it behind the leather. Write the same key on it and that way you could tip your hat onto someonea phone for a quick transfer for later communications.

    With the way you stitched it, you could easily push one of the flat flexible ones there without having to mess with the stitches


  • That is actually missing an important issue, hallucinations.

    Copying from SO means you are copying from a human who might be stupid or lie but rarely spews out plausible sounding hot garbage (not never though) and because of other users voting and reputation etc etc, you actually do endup with a decently reliable source.

    With an LLM you could get something made up based on nothing related to the real world. The LLM might find your question to be outside of it’s knowledge but instead of realizing it it would just make up what it thinks sounds convincing.

    It would be like if you asked me how that animal that is half horse and half donkey is called and instead of saying “shit i’m blanking” I would say “Oh, that is called a Drog” and I couldn’t even tell you that I just made up that word because I will now be convinced that this is factual. Btw it’s “mule”

    So there is a real difference until we solve hallucinations, which right now doesn’t seem solvable but at best reduced to insignificance (maybe)








  • Do you know for sure that all traffic out of your devices is properly encrypted? Do you know for sure that non of your devices is listening on a port in an unsecured or vulnerable way?

    Realistically, a public WiFi is not that big of a deal as it used to be before almost everything moved to authenticated and encrypted protocols, but there are still plain protocols being used all the time (dns for example) and unless your devices are super up to date you will probably have some possible security issues.

    Given the choice you should use a private WiFi, second best is a VPN over a public WiFi, third is a plain public WiFi.

    We are past the days of connecting to an attacker controlled WiFi means you are owned, but you are still at a privacy risk and some security risk.






  • About as much as I trust other drivers on the road.

    As in I give it the benefit of the doubt but if something seems off I take precautions while monitoring and if it seems dangerous I do my best to avoid it.

    In reality it means that I rarely check it but if anything seems off I remove it and if I have the time and energy I further check the actual code.

    My general approach is minimalism, so I don’t use that many unknown/small projects to begin with.