TehPers

joined 2 years ago
[–] TehPers@beehaw.org 22 points 11 hours ago

Last time I tried scanning and printing on Windows, it took me over an hour to get the device recognized, the right drivers installed, the printer to actually receive the print job, and so on. Printers are just shitty pieces of hardware, Linux or not.

[–] TehPers@beehaw.org 4 points 14 hours ago

What you're referencing is distillation. Anthropic even has an article on distillation "attacks" (as if they have some divine right to the data behind their models) that goes over it a bit.

[–] TehPers@beehaw.org 0 points 3 days ago (1 children)

recovery email which they did not hash

How do you recover an account on the other providers? Do you have to provide the same recovery email you set before during account recovery? If you hash the email, you have no way of reading it anymore, so someone has to provide it to you again.

[–] TehPers@beehaw.org 1 points 5 days ago

In good news, we got a summary of his 9950x3d2 review, which was basically that it's a ripoff at $900. Unironically, if you're somehow in the market for a CPU like that, consider either the 9950x3d for productivity and core count, or the 9800x3d for gaming. The 9950x3d2 brings nothing to the table for anyone outside of maybe some niche applications which need both core count and cache size and can afford the latency for data transfers between CCDs.

Or, I guess, don't buy anything because all the companies suck and everything is unbelievably expensive. Who needs a computer anyway?

[–] TehPers@beehaw.org 1 points 2 weeks ago

A quick search might answer your question, but at its core, it treats people as the vulnerability rather than anything software related.

[–] TehPers@beehaw.org 0 points 2 weeks ago (2 children)

People talk about security here occasionally, though there are places to discuss it. Also, bugs are the most common source of vulnerabilities (though social engineering is a much more common type of attack), so the response seems reasonable to me.

Regarding hacking, for white hat I believe there are communities, though I'd imagine there's overlap with cybersecurity communities. I don't know of, nor would I recommend, anything black hat.