brie

joined 1 week ago
[–] brie@programming.dev -5 points 4 days ago (20 children)

Large context window LLMs are able to do quite a bit more than filling the gaps and completion. They can edit multiple files.

Yet, they're unreliable, as they hallucinate all the time. Debugging LLM-generated code is a new skill, and it's up to you to decide to learn it or not. I see quite an even split among devs. I think it's worth it, though once it took me two hours to find a very obscure bug in LLM-generated code.

[–] brie@programming.dev 2 points 4 days ago

With current kWh/token it's 100x of a regular google search query. That's where the environmental meme came from. Also, Nvidia plans to manufacture enough chips to require global electricity production to increase by 20-30%.

[–] brie@programming.dev 1 points 4 days ago

Proton gives data to governments if requested. Why are you trying to shill it?

[–] brie@programming.dev 2 points 4 days ago (2 children)

Pedantic types always mention that secure is only relevant in the context of a particular threat model. The elderly can use hardware authentication like those RSA devices or ubikey. Unfortunately, this is expensive, and banks don't believe there's demand for that. Would you switch banks for this feature?

[–] brie@programming.dev 0 points 5 days ago

Good, because it's not of interest.

Even better for your career is being an actual researcher with a good grasp on heap grooming, MAC circumvention instead of spreading FUD over something that can easily be detected with burp.

[–] brie@programming.dev 1 points 5 days ago (4 children)

What about people who only have one device? Kids, elderly, people with only work computer.

[–] brie@programming.dev 3 points 5 days ago

Simply paying is not sufficient. You need to be a telecom company, or a researcher afaik.

In what world would the US gov care to get into your bank account? Or your Facebook account when it's already tightly controlled?

[–] brie@programming.dev 1 points 5 days ago (2 children)

Proton is already used for identity management: OTP via email. They'll implement OAuth if there's enough demand for it. A company's purpose is to be profitable, ethics side is largely irrelevant.

Many countries already have digital government ID: Australia, Estonia, Russia.

[–] brie@programming.dev 2 points 5 days ago

Watch the video again to see how hard it was for Derrick to get access. He got it via his telecom/academia researcher contact.

[–] brie@programming.dev 4 points 6 days ago (10 children)

S7 will be retired or extended with access control. TOTP apps don't work for edge cases like broken phone. Dedicated token devices get lost. SMS will continue being the main solution for 2FA.

[–] brie@programming.dev 1 points 6 days ago (1 children)

Large gains were due to scaling the hardware, and data. The training algorithms didn't change much, transformers allowed for higher parallelization. There are no signs of the process becoming self-improving. Agentic performance is horrible as you can see with Claude (15% of tasks successful).

What happens in the brain is a big mystery, and thus it cannot be mimicked. Biological neural networks do not exist, because the synaptic cleft is an artifact. The living neurons are round, and the axons are the result of dehydration with ethanol or xylene.

[–] brie@programming.dev 5 points 6 days ago (16 children)

Not true. SMS is encrypted in 3G, LTE, 5G. Block cyphers like Kasumi and A/9 are used. SMS is reasonably secure, because it's hard to infiltrate telecom systems like S7

view more: ‹ prev next ›