политический кубик

Apr. 22nd, 2025 08:55 pm
lxe: (Iron Sky)
[personal profile] lxe
(Хочу проверить гипотезу, достаточно ли политического квадрата.)

Ось X -- Украина, ось Y -- Израиль, ось Z -- Америка/Европа (popular sovereignty).
Отрицательные полуоси -- РФ, филистимляне, глобалисты.

нет-нет-нет -- "за РФ, за Палестину, но при этом за Клауса Шваба". Принципиальный авторитарий.
нет-нет-да -- "зенитные кодексы аль-Эфесби". РФ и ее полезные идиоты.
нет-да-нет -- какой-нибудь израильский циник типа Льва Вершинина.
нет-да-да -- за Израиль, за Трампа, но против Украины -- "я не с надеющимся, я с надежным".
да-нет-нет -- традиционный восточноевропейский/канадский антисемит, либо ортодоксия демпартии.
да-да-нет -- Чак Шумер.
да-нет-да -- очень взволнованный восточноевропейский антисемит (неуловимый украинский наци).
да-да-да -- честный человек.

Реально существуют и представляют какую-то политическую силу ННД, ДНН, ДДД. ДНД -- это Андрей Торба.
НДД -- это предполагаемая злопыхателями (она же эффективная) позиция американской администрации на данный момент.

дискриминации псто

Apr. 20th, 2025 09:39 pm
lxe: (Default)
[personal profile] lxe
Islam is right about dogs.
And cats.
paserbyp: (Default)
[personal profile] paserbyp
The app that serves up hot takes on how to fix the world recently got one from its founding father. Twitter (now X) founder Jack Dorsey posted pithily: “delete all IP law,” to which the app’s stepfather, Elon Musk, replied with even greater brevity: “I agree.”

So, what do the two tech bigwigs have against laws restricting the commercial use of patented inventions and copyrighted works of creative expression? It’s probably got to do with how they impact the current talk of the town in tech: AI models trained on copyrighted works produced through hours of human chin-scratching.

Dorsey’s call to Ctrl A+Delete terabytes of laws regulating the monetization of human ingenuity garnered nearly 5,000 replies:

* Tech investor Chris Messina commented that “automated IP fines/3-strike rules for AI infringement may become the substitute for putting poor people in jail for cannabis possession.”

* Tech entrepreneur and attorney Nicole Shanahan disagreed, saying deletion wasn’t reasonable but that she’s open to discussing IP reform.

* Writer Lincoln Michel suggested that Dorsey and Musk’s anti-IP stance is hypocritical, claiming that “none of Jack or Elon’s companies would exist without IP law.”

Since it’s hard to boil this all down to 280 characters, let’s get into the complicated legal and business issues behind the social media squabble.

Musk and Dorsey are members of the Silicon Valley clique convinced that current IP regulations are as conducive to tech advances as human-operated toll booths are to speeding up traffic. Dorsey is a longtime champion of open-source software. In 2019, he founded the Twitter clone Bluesky as an open-source project, and his company Block recently released the AI agent-building application called Goose, which is free for anyone to use.

Before that, Musk once said that “patents are for the weak”:

* He famously declared a decade ago that Tesla wouldn’t sue anyone who uses its tech “in good faith,” though it did subsequently end up in a patent dispute with an Australian electronics company.

* The first version of Musk’s AI bot, Grok, was partially open-source, pitting it philosophically against the proprietary (aka not free to use for profit) OpenAI models.

Intellectual property law professor Dennis Crouch claims that Dorsey and Musk don’t like IP law because it impedes their business interest as tech moguls, since these laws are meant to preserve small enterprises against corporate behemoths.

Unsurprisingly, the biggest advocates for compensating creatives for their work that gets used to train AI are…creatives. Michel declared in his X response that Musk and Dorsey simply “hate artists.”

More than 30,000 creators recently signed a Statement on AI Training almost as succinct as Dorsey’s post. It said: “The unlicensed use of creative works for training generative AI is a major, unjust threat to the livelihoods of the people behind those works, and must not be permitted.” Similar sentiments have been shared by visual and musical artists, as well as journalists, but the legal questions remain unsettled:

* The New York Times is suing OpenAI for copyright infringement, alleging that the company used its content illegally to train ChatGPT. However, several news organizations, like News Corp, Axel Springer (Morning Brew’s parent company), and Time magazine, have entered licensing agreements with AI companies.

* A group of publishers and authors, including Sarah Silverman and Junot Díaz, are suing Meta, alleging that it used their copyrighted works to train its Llama AI models without compensating them. Meta claims that feeding its AI training algorithm the works of literature constituted “fair use.”

What is fair use?

It’s the legal term for when copyright-protected content can be used without the owner’s permission for a “transformative” purpose such as criticism, comment, news reporting, teaching, scholarship, or research—for example, a poem quoted in a news article, or an SNL parody of the latest Severance episode. Legal scholars say judges in the creators vs. AI companies cases will have to consider the complex technicalities of exactly how the AI was trained using proprietary content and whether it meets the definition of fair use.

Experts say that IP law needs to be updated to keep pace with technological advancements and the evolving distribution of content. The breakneck pace of AI development creates even more urgency for these updates(More details: https://hls.harvard.edu/today/is-the-law-playing-catch-up-with-ai).

Some warn that a global patchwork of laws could complicate AI development and have called for the establishment of international standards.

Legislators worldwide have been working to revise IP laws for the age of AI, aiming to strike a balance between innovation and fairly compensating creators. Some countries are considering a more pro-AI approach, like the UK, where the government is weighing a controversial rule that would let companies use copyrighted works without permission if IP owners don’t opt out.

придумал название

Apr. 19th, 2025 09:58 pm
lxe: (Iron Sky)
[personal profile] lxe
для инспирационной феминистской трилогии про украинскую военную летчицу: "Оксана в вышних".
lxe: (Default)
[personal profile] lxe
и, значит, уместно ответить.

Где ошибка, совершенная "девой на букву ж.", которую не совершили ни Клеопатра, ни Мария Египетская?
И к К., и к св. МЕ можно прийти, изыскивая, что значит быть египтянкой, но ни К., ни св. МЕ не руководствовались этим в своей жизни. Ни одна из них не искала "египетскости" и не старалась воплотить "египетскость", даже став (по общему мнению) идеальным воплощением таковой. У них были другие соображения, в т.ч. довольно частные, но соображения разделения человеческого рода по этому критерию -- не было.

И Египет живет, и Израиль живет безотносительно.
А проживет ли Франция еще пятьдесят лет, вопрос открыт.
(Украине, в худшем случае, и двадцати не отпущу.)
lxe: (Default)
[personal profile] lxe
напишу про Клеопатру. Потому что "Египетские ночи" читал еще в детстве (и ни хрена не понял; с другой стороны, а кто бы понял, но ок), а продолжение Брюсова прочел три дня назад или около того.

И что я по этому поводу могу сказать.
Флавий -- вера философов. "Прикольная история, а вот еще у племени Тумба-Юмба..." Стоицизьма, моноатеизьма, а все-таки в никуда. Начав с нейтрального элемента, к нейтральному элементу придешь. Это [personal profile] avva и иже с ними.
Критон -- вера простого человека в Николу: никакой пользы от Бога, кроме мирских благ, и никакой надежды на прорыв из. Про то, что выбросил в метро третий сборник Брэдбери, обнаружив это жалостное "ну, хоть сиськи еще покажи!", уже писал, но всегда готов напомнить.
Безымянный почитатель -- вера книжников и фарисеев. "Наш Бог, а больше ничей". Это одно все портит.

Про Антония в конце тоже очень понятно. You invest in me, I invest in you. Никакой другой обмен не будет честным.

Вот, надеюсь, немножко оправдался за чтение Брюсова на Страстной неделе. (Вроде бы не зря.)

неол.

Apr. 16th, 2025 08:56 pm
lxe: (фундаментализм)
[personal profile] lxe
орлянка, орлянская дева Жанна д'Арк.
См. "Орленок, орленок, взлети выше солнца" (зикр комми-шахидов).
Пример употребления: "Начал играть в орлянку и покатился".

4Chan

Apr. 16th, 2025 09:10 am
paserbyp: (Default)
[personal profile] paserbyp
Starting on Monday night, users began reporting a mass outage at the 4chan.org domain, which has persisted for the last 12 hours, according to Downdetector.com.

But during the outage, users spotted evidence that 4chan suffered a breach that enabled a hacker to gain access to the site. This includes a screenshot that apparently shows an account from 4chan’s owner Hiroyuki Nishimura writing: “LOL HACKED I LOVE DICKS.”

Another post from the hijacked Nishimura’s account indicates the hacker gained access to the backend administrative site for 4chan. The same screenshot shows that 4chan runs on an old version of PHP, a scripting language for websites.

As a result, users suspect the hacker exploited age-old vulnerabilities in 4chan to conduct the takeover. A rival imageboard at Soyjak.party has also been celebrating the site’s shutdown.

t’s possible someone at Soyjak.party was involved in the hack since the 4chan board for questions and answers was briefly changed to say “SOYJAK.PARTY WON.” The Soyjak.party site has also been posting screenshots that show the hacker was able to access moderator functions for 4chan. This includes accessing the ability to ban 4chan users, revealing their IP address, ISP, and geographic location.

In addition, links have appeared on Soyjak and on another web forum, Kiwi Farms, that claim to contain data stolen from 4chan, including the usernames and email addresses for hundreds of moderators. So, it’s possible the hacker may have stolen email address information for all registered users of the site.
lxe: (фундаментализм)
[personal profile] lxe
Те же самые люди,

(а) которые при обсуждении агрессии РФ против Украины не допускают ни для одной из даже косвенно вовлеченных сторон никаких оттенков смысла (например, due process и 1A для гражданских, суждений о мотивах действующих лиц, советов симпатизируемой стороне и т.д.),

(б) сейчас возмущены отсутствием видимости due process в отношении

(б)(а) людей, приехавших в Соединенные Штаты для того, чтобы резать и насиловать местных жителей и забирать их пожитки, или
(б)(б) людей, координированно с профессионалами в области резьбы евреев и на их деньги защищающих право оных профессионалов заниматься оной резьбой.

Понятно, "наше ЧП -- это для всего мира ЧП", нужен особый образ действий.
Но ведь и думать, выходит, неизбирательным образом запрещается.

Что об этом сказал бы Сократ? Выпил бы йаду, наверное, не дожидаясь приговора.
Не будьте как Сократ, да продлятся дни ваши. Будьте как Диоген.

Slopsquatting

Apr. 15th, 2025 07:33 am
paserbyp: (Default)
[personal profile] paserbyp
Cybersecurity researchers are warning of a new type of supply chain attack, Slopsquatting, induced by a hallucinating generative AI model recommending non-existent dependencies.

According to research by a team from the University of Texas at San Antonio, Virginia Tech, and the University of Oklahama, package hallucination is a common thing with Large Language Models (LLM)-generated code which threat actors can take advantage of.

“The reliance of popular programming languages such as Python and JavaScript on centralized package repositories and open-source software, combined with the emergence of code-generating LLMs, has created a new type of threat to the software supply chain: package hallucinations,” the researchers said in a https://arxiv.org/pdf/2406.10279.

From the analysis of 16 code-generation models, including GPT-4, GPT-3.5, CodeLlama, DeepSeek, and Mistral, researchers observed approximately a fifth of the packages recommended to be fakes.

According to the researchers, threat actors can register hallucinated packages and distribute malicious codes using them.

“If a single hallucinated package becomes widely recommended by AI tools, and an attacker has registered that name, the potential for widespread compromise is real,” according to a Socket analysis of the research. “And given that many developers trust the output of AI tools without rigorous validation, the window of opportunity is wide open.”

Slopsquatting, as researchers are calling it, is a term first coined by Seth Larson, a security developer-in-residence at Python Software Foundation (PSF), for its resemblance to the typosquatting technique. Instead of relying on a user’s mistake, as in typosquats, threat actors rely on an AI model’s mistake.

A significant number of packages, amounting to 19.7% (205,000 packages), recommended in test samples were found to be fakes. Open-source models –like DeepSeek and WizardCoder– hallucinated more frequently, at 21.7% on average, compared to the commercial ones (5.2%) like GPT 4.

Researchers found CodeLlama ( hallucinating over a third of the outputs) to be the worst offender, and GPT-4 Turbo ( just 3.59% hallucinations) to be the best performer.

These package hallucinations are particularly dangerous as they were found to be persistent, repetitive, and believable.

When researchers reran 500 prompts that had previously produced hallucinated packages, 43% of hallucinations reappeared every time in 10 successive re-runs, with 58% of them appearing in more than one run.

The study concluded that this persistence indicates “that the majority of hallucinations are not just random noise, but repeatable artifacts of how the models respond to certain prompts.” This increases their value to attackers, it added.

Additionally, these hallucinated package names were observed to be “semantically convincing”. Thirty-eight percent of them had moderate string similarity to real packages, suggesting a similar naming structure. “Only 13% of hallucinations were simple off-by-one typos,” Socket added.

While neither the Socket analysis nor the research paper mentioned any in-the-wild Slopsquatting instances, both cautioned protective measures. Socket recommended developers install dependency scanners before production and runtime to fish out malicious packages. Rushing through security testing is one of the reasons AI models succumb to hallucinations. Recently, OpenAI was blamed for slashing its models’ testing time and resources significantly, exposing its usage to significant threats.

неол.

Apr. 15th, 2025 04:10 am
lxe: (Iron Sky)
[personal profile] lxe
блатоубийственная война

Oracle Admits Breach

Apr. 14th, 2025 11:49 am
paserbyp: (Default)
[personal profile] paserbyp
Oracle has continued to downplay a data breach it suffered earlier this year, insisting in an email sent to customers this week that the hack did not involve its core platform, Oracle Cloud Infrastructure (OCI).

Normally, a denial like this would be the end of the story, but the circumstances of this breach and Oracle’s confusing response to it over recent weeks have left some questioning the company’s account of the incident.

This week’s email, forwarded to this publication by Oracle, claimed that the incident involved “two obsolete servers” unconnected to the OCI or any customer cloud environments.

“Oracle would like to state unequivocally that the Oracle Cloud — also known as Oracle Cloud Infrastructure or OCI — has NOT experienced a security breach,” stated the letter.

“No OCI customer environment has been penetrated. No OCI customer data has been viewed or stolen. No OCI service has been interrupted or compromised in any way,” it continued.

No usable passwords were exposed because these were “encrypted and/or hashed.”

“Therefore, the hacker was not able to access any customer environments or customer data,” the email concluded.

But if the “two obsolete servers” weren’t part of the OCI system, what were they part of? And what, if any, customer data did the hacker access? At this point, the opinions of security researchers and the counter-assertions by Oracle, start to diverge.

The fact that a breach of some kind had occurred was first made public in March, when a hacker using the moniker ‘rose87168’ publicized on a breach forum their theft of six million single sign on (SSO) and Lightweight Directory Access Protocol (LDAP) credentials, among other sensitive data, allegedly stolen from the Oracle Cloud platform.

If true, that would be a big deal; SSO and LDAP credentials, even if competently hashed, are not something any cloud provider or customer would want to be in the hands of a third party.

The hacker told Bleeping Computer that they gained access to the Oracle system in February, after which they had attempted (and failed) to extort payment from Oracle in return for not releasing the data.

But even if the hashes remained secure, other sensitive data could be used to mount targeted attacks, noted security company Trustwave:

“The dataset includes PII, such as first and last names, full display names, email addresses, job titles, department numbers, telephone numbers, mobile numbers, and even home contact details,” wrote Trustwave’s researchers, pointing out that the consequences of such a breach could be expensive.

“For the organizations affected, a leak like this one could result in data breach liabilities, regulatory penalties, reputational damage, operational disruption, and long-term erosion of client trust,” they wrote.

Oracle subsequently denied the breach claim, telling the media: “The published credentials are not for the Oracle Cloud. No Oracle Cloud customers experienced a breach or lost any data.”

In early April, the company changed tack slightly, admitting that it had been breached, but insisting that the data had been taken from a “legacy environment” (aka Oracle Classic) dating back to 2017. That story claimed that Oracle had started contacting customers, mentioning that the FBI and CrowdStrike were investigating the incident.

This incident was in addition to a separate data breach – described as a “cybersecurity event” – affecting Oracle’s healthcare subsidiary, Oracle Health.

So far so good regarding Oracle’s denials, except that the hacker subsequently shared data showing their access to login.us2.oraclecloud.com, a service that is part of the Oracle Access Manager, the company’s IAM system used to control access to Oracle-hosted systems.

It also emerged that some of the leaked data appeared to be from 2024 or 2025, casting doubt on Oracle’s claim that it was old.

So, was Oracle’s main OCI platform breached or not? Not everyone is convinced by the company’s flat denials. According to prominent security researcher Kevin Beaumont, the company was basically “wordsmithing” the difference between the Oracle Classic servers it admits were breached, and OCI servers, which it still maintains were not.

“Oracle rebadged old Oracle Cloud services to be Oracle Classic. Oracle Classic has the security incident,” noted Beaumont in a dissection of the incident and Oracle’s response on Medium.

“Oracle are denying it’s on ‘Oracle Cloud’ by using this scope – but it’s still Oracle cloud services, that Oracle manage. That’s part of the wordplay.” Oracle had also quietly contacted multiple customers to confirm some kind of breach, he said.

This leaves interested parties with the unsatisfactory sense that something untoward has happened, without it being clear what.

For now, Oracle is sticking to its guns that its main OCI platform is not involved, but perhaps the confusion could have been avoided with better communication.

Suffering a breach is hugely challenging for any organization but it sometimes pales beside the problems of communicating with customers, journalists, and the army of interested researchers ready to pick apart every ambiguity. Weeks on from the breach becoming public, those ambiguities have yet to be fully cleared up.
lxe: (Iron Sky)
[personal profile] lxe
Ученые доказали нашим уважаемым оппонентам, что собака лучше, чем жена.

Вот все бы социалисты с просвещенными абсолютистами так! Одно поколение, и problem solved.
Page generated Apr. 23rd, 2025 10:32 pm
Powered by Dreamwidth Studios