

And you didn’t even read past the first sentence I see.
Saying they’re the same because they both use a neural network is roughly equivalent to saying things are they same because they’re both manipulating kinetic energy.


And you didn’t even read past the first sentence I see.
Saying they’re the same because they both use a neural network is roughly equivalent to saying things are they same because they’re both manipulating kinetic energy.


… How if flying a spaceship different from driving a car? They’re both controlled applications of kinetic energy to move people or objects.
At the end of the day, it’s all a pile of transistors and the only thing that is of import is the intent behind usage.
In one case it’s saying you can use a neural net to take something rendered at resolution A/4 and make it visually indistinguishable from the same render at resolution A.
The other is rendering something and radically changing the artistic or visual style.
Upsampling can be replicated within some margin by lowering framerate and letting the GPU work longer on each frame. It strives to restore detail left out from working quicker by guessing.
You cannot turn this feature off and get similar results by lowering the frame rate. It aims to add detail that was never present by guessing.
Upsampling methods have been produced that don’t use neural networks. The differences in behavior are in the realm of efficiency, and in many cases you would be hard pressed to tell which is which. The neural network is an implementation detail.
In the other case, the changes are more broad than can be captured by non AI techniques easily. The generative capabilities are central to the feature.
Process matters, but zooming out too far makes everything identical, and the intent matters too. “I want to see your art better” as opposed to “I want to make your art better”.
The official story is that it’s mobile general surveillance to deter crime.
They’re very open that it’s a surveillance system that watches everyone and records everything.
They’re a little less open about how open they are with police or exactly how much they can correlate everything with other data. Most people don’t have an intuitive feel for how easy it is to piece together a lot about their lives from some small measurements when tied to everyone else’s, so they just stop at being annoyed by the lights and sometimes fucking commercials.


Nah, it’s cool. We’re clearly talking at cross purposes. Have a good one.


It was bought by Microsoft after becoming established. Most free software projects don’t care enough to move if they don’t self host.


And I’m just letting you know that link bombing isn’t, and it’s actually a discussion if you explain your point rather than dropping someone else’s novel.
If for no other reason than because you don’t have to dig for what part of what was posted is related to what they were saying, and you can much faster say “ah, you’re talking about something totally different than I am”.


Just so you know, from looking at the wall of text you pasted by proxy: those are arguments against the notion that a tpm can make the device itself secure, not that it is untrustworthy for the notion of signing and storing encrypted data.
Next time, make your point and provide references (or not), rather than just link bombing.


I’m not seeing anything that’s not a great look about requiring strong authentication for access to sensitive portions of a users account. What you’re saying is akin to calling it a bad look that they force users to use complex passwords against user wishes.
I’m not sure what “trust me bro, my cloud is safe” has to do with anything. Passkeys live on your device. There are ways of facilitating device to device migrations of the keys if you want. You don’t need to use them to use passkeys. And at least on Android you don’t need to even use Google to manage the keys.
Most semiconductors are closed source. The processor, ram, and radio are also more than likely closed. The software interfaces to all of them have open specification and implementation. There’s like, six for Linux. Microsoft open sourced theirs.
Tpms are not security through obscurity. They are obscure, but that’s not a critical component to their security model.
What they do isn’t really what “collecting biometrics” implies. They’re storing key points in a hashed fashion that allows similarities to be compared. Even if it wasn’t encrypted in a non-exportable way you still can’t do anything with it beyond checking for a similarity score.
You’ve done a good job explaining what I said previously: there’s sometimes a disjoint between privacy and security concern, and so sometimes people don’t understand something about security.


That’s close enough for a privacy perspective. There’s also limitations on domains that can request the auth, specifically ”only the one the credential is for", and there’s a different key per domain and user typically.
It’s also implemented in a way where if the user doesn’t choose to disclose their account to the service, the service can’t know.
Caring about privacy and caring about the details of a security protocol are distinct. You’d be surprised how many people who care about privacy are deeply wary of passkeys because of the biometric factor, which is unfortunate because the way it authenticates is a lot harder to track across domains by design.
I understood they had a lot of concerns, one of which was biometrics via passkeys since GitHub was a very early adopter due to the supply chain risk they pose.


I know how device fingerprinting works, thank you though.
You don’t need my fingerprint, hardware or personal, or biometric shit.
To me that sounds like hardware identifiers, but also quite specifically the things passkeys use. Hence I mentioned it as aside from their main point, which was “don’t track me”, because the biometrics GitHub or any website is going to ask you to use can’t be used for that.


Tangential to the main point you’re going for: when you say fingerprint or biometrics I think you’re referring to passkeys.
Passkeys don’t share any of your fingerprint or other biometric identifiers with anyone.
https://www.eff.org/deeplinks/2023/10/passkeys-and-privacy
One of the major design criteria of their creation was to be an increase in security without sacrificing privacy. It’s made them more finicky to get working but there’s a very good reason they’re very popular with security professionals.


First, you’re assuming that most successful assassins are the unstable nutcases. It could just be that it’s more memorable when the motivation is “make jodi foster love me” than “stop an expansionist imperialist who’s destroying the lives of the common man”.
You’re also more likely to be a lone assassin if you don’t conform to social norms because social norms say not to kill people.
The most prolific assassins are just common soldiers whose names we don’t even record.


Conservatives seem to oscillate between isolationism and aggressive intervention. They’re both from the stance of American primacy, either using our military for our benefit and to enforce our wishes or saying the world has nothing to offer us we need and that we’re better off not extending effort or energy on the rest of the world.
Currently our conservatives are swinging towards isolationism, which is why the anti immigration rhetoric and pulling out of international organizations was very popular. That’s not compatible with a plan to forcibly annex another country.


I’m not saying it’s impossible, I’m saying that the people who are saying that they’ve lost all faith in Americans because we haven’t full actualized a revolution in less than a year are being shitty for no good reason. Armchair revolutionaries who think that it should be done now because it’s supposed to be as simple as “organize, kick them out, make a new government and they all just say shucks while we arrest them”.
As you said, people are getting organized. But to some people outside the US, that’s not enough and we should be done deposing the government by now. That’s what I’m saying is unreasonable.
Based on the finish dude in your icon and finish instance name, I’m assuming you’re in Finland.
Organization takes longer here than it would there based purely on population. I’m in an average sized state. Our population is twice that of Finland. The state is about the same size as the country.
Even if we were all on board even for a strike, it’s still gonna take longer than so many people seem to expect us to be able to do it in.


Alright. How do I make that happen? I’m assuming since you’re answering so confidently that you actually have an answer and have done something like this before.
You certainly couldn’t just be another armchair revolutionary who handwaved the entire “plan a nationwide general strike and risk execution for insurrection” based purely on what you think sounds straightforward, right?
Most revolutions have outside partisans who come and lend a hand. Why don’t you come over and do that?
Maybe it’s a bit trickier to organize hundreds of millions of people to have at least passive support for something and interrupt the social momentum of hundreds of years of uninterrupted peaceful transfer of power than can be accomplished in less than a year and being shitty towards the people who are upset and don’t know what to do is just … Being shitty.


Yes, that’s what I’m asking for the details of how you do it. I don’t know how to do a revolution. My assumption is that the people who confidently and definitely know that we’re doing it wrong must have some idea how to do it right.
So again, how do I overthrow the US government?
You people dicked around so long
“So long”? What’s your threshold for a reasonable timeline for a revolution to start? he hasn’t even been in office a full year.


Walk me through your plan to depose the American government in less than a year. Don’t forget that if you fail or are caught planning they don’t just kill you, they kill you by injecting you with poison that feels like being set on fire from the inside while you suffocate, take everything you or your family possess leaving your survivors homeless and destitute, shoot your dog and probably a couple of family members too.
Like, if you’ve lost all faith we’ll “do what needs to be done”… What needs to be done?


It’s slightly more complicated than that. Still doesn’t make him look good but it’s more nuanced.
He was a Nazi and flagrant racist before Nazi was the unequivocally negative descriptor we think of it as today.
He thought Nazism was right for America the same way he thought square dancing would keep away the blacks and that the Jews would be undercut if he did car financing without banks.
He was awful and a patriot, so when Germany went to war with America he was unequivocally in favor of destroying the Germans.
He still agreed with them on everything else.
This image seems to explain it.
Proton is the windows compatibility layer. Lepton is the android compatibility layer. FEX translates x86 (most desktop computers) applications to run on ARM (most mobile devices).