• 0 Posts
  • 140 Comments
Joined 3 years ago
cake
Cake day: June 30th, 2023

help-circle





  • Lol I thought your link was “here’s a rocket designed by an LLM” rather than one designed by the non-LLM AI.

    LLMs are a local minimum that tech bros are stuck trying to optimize to a generally useful point because its language abilities are able to fool so many (just like how a real person talking with confidence can fool so many).

    This obsession with LLMs is making me question general human intelligence more lol. It’s looking more and more like we are just dumb apes but get lucky and every now and then a smart ape is born and teaches the other dumb apes how to bring their stupidity to whole new levels.


  • An alternative that will avoid the user agent trick is to curl | cat, which just prints the result of the first command to the console. curl >> filename.sh will write it to a script file that you can review and then mark executable and run if you deem it safe, which is safer than doing a curl | cat followed by a curl | bash (because it’s still possible for the 2nd curl to return a different set of commands).

    You can control the user agent with curl and spoof a browser’s user agent for one fetch, then a second fetch using the normal curl user agent and compare the results to detect malicious urls in an automated way.

    A command line analyzer tool would be nice for people who aren’t as familiar with the commands (and to defeat obfuscation) and arguments, though I believe the problem is NP, so it won’t likely ever be completely foolproof. Though maybe it can be if it is run in a sandbox to see what it does instead of just analyzed.







  • I haven’t gotten my hands dirty with this stuff specifically, but maybe you need to adjust buffer sizes to properly handle the different bit rates. Do you mainly see issues with higher combinations? The sample rate * bit depth is the important number, here. If you consider the problematic ones from that perspective, is there a threshold where anything under works fine but anything above has issues that get worse depending on how far above the threshold it is?

    I’m not certain, but I believe the audio buffer is handled via a callback function that gets called when the audio buffer is some % close to empty, and then the program refills the buffer, plus some other overhead. That data left in the buffer sets the deadline for refilling the buffer; miss that deadline and the audio cuts out. Meet the deadline and audio is seemless.

    A too small buffer will require the callback be called more often, and then the overhead can add up to missing deadlines. Alternatively, the % when it does the callback might need to be adjusted.

    Another consideration is if your DAC doesn’t support the chosen sample rate and bits per sample, then there is probably another buffer of the supported size and a conversion from one to the other (and its own callback when that buffer gets low). That said, I don’t know if it’ll even list unsupported combinations because I’m having trouble thinking of a valid use case. But it’s technically possible, so maybe it is like that.

    Anyways, those are what I’d be checking to debug this. If it is a setup problem, it won’t likely ever go away on its own, unless better defaults get set for those bitrates, but the ideal values depend on your system’s performance, so if yours is on the weaker side, it might never change.



  • They might have set up the user agreement for it. Stackexchange did and their whole business model was about catching businesses where some worker copy/pasted code from a stackexchange answer and getting a settlement out of it.

    I agree with you in principle (hell, I’d even take it further and think only trademarks should be protected, other than maybe a short period for copyright and patent protection, like a few years), but the legal system might disagree.

    Edit: I’d also make trademarks non-transferrable and apply to individuals rather than corporations, so they can go back to representing quality rather than business decisions. Especially when some new entity that never had any relation to the original trademark user just throws some money at them or their estate to buy the trust associated with the trademark.


  • It does but your comment didn’t say that outright and people who just avoid deep friers because they don’t want to deal with the oil probably don’t make assumptions about deep friers making it easy to deal with that stuff.

    I didn’t realize deep friers were more than fancy pots with stoves and temperature control built in and baskets so you don’t have to fish the fish and chips out with tongs. If I had more space and less fat, I might even have gotten one now that I understand they can also help manage the oil.

    Probably better to get a rice cooker, though.





  • When I was in school, I wanted a Linux machine (since my school stuff was mostly linux and I wanted to be able to work locally instead of having to ssh in to school machines) but wasn’t comfortable doing it on my main PC, so I bought a cheap laptop and inatalled linux on that. Had the extra bonus of being smaller and lighter than my gaming laptop that was my main PC at the time, too.

    Your options will probably be a bit more expensive (and apologies for suggesting a solution that involves throwing money at it if you aren’t in a position to get even a relatively cheap one) since it’s running windows and needs the hardware for that, including TPM if your school stuff requires win 11 (though if you can get away with win 10 or 7, you could probably get a cheaper machine). Though on the other hand, your tasks might not require a GPU, which can save a lot right there.

    Then you can truly isolate your personal stuff from winsows, especially if you set your LAN up to never let the windows machine know that the linux machine even exists.

    I also use this with consoles to play games I’d like to try but they have DRM or anticheat that I don’t want on my PC. Also kinda doing it with work, though the laptop belongs to them.