Skip Navigation

Posts
8
Comments
141
Joined
4 mo. ago

...cogito, ergo sum...

  • The origins of my 20-year art career were not that different from many other artists. I started learning the craft by seeking out inspirational artworks, and it is something I continue to do...

    Inaccurate reproductions of art can betray the intentions that artists had for their works. Inaccurate reproductions of art can betray the intentions that artists had for their works. Artists use their passions to create original art, with the intention of offering the viewer a unique vision and experience.As an artist, I spend a good deal of time determining the best way to approach my work. Coming up with the original idea is just the first step. I also have to consider which medium would be best to explore the idea, materials to use with it, and the size of the work. Imagine how insignificant a landscape would be on a postcard, or how ridiculously terrifying a wall-sized closeup of a single human eye would be. I also consider if I want to paint in a lot of detail, or leave the brush strokes more open.All of these thoughts, and many more, are planned in an effort to get a reaction emotionally from the viewer...

    A reproduction can show the general idea of art, but it can not offer the unique experience of reflecting on the full story that an original piece offers. Original artworks feature textures, lighting differences, and environments evoking the emotions that the artist intended.

    Seeing an original piece of art in a museum is a unique, transcendent experience, substantially better than any reproduction could possibly be. With reproductions being produced with the wrong resolution, terrible and inaccurate colors, and of bad quality, the experience of seeing reproduced art betrays the emotion and intent that the artist wanted to create.The original artwork can educate about techniques, colors, and even movements within art history. Original pieces offer admiration of the artist, and reflection for the viewer, in unique and environmental ways that simply are not possible online or with printed reproductions.

    To truly see artwork, to find the experience that the artist wanted the viewer to have, finding the original piece of art is the best way to live through artwork.

    Source (Original art is always better than a reproduction...)

    Related:- The Problem with Gaming’s Remake Culture- My first video game experiences- My First Video Game Memories

  • Indeed. It should be either date or timer!Unless, it's something more complex as temperature, humidity, or radio setup even!

  • I am sorry, but what is that, automated or not, post for...?The question is of 2009...Sure, repetition is training, but it's been 2026... and there are numerous answers for this question, and from different viewpoints of the history and implementation in different shells for undefined worldviews.

  • We show that large language models can be used to perform at-scale deanonymization.

    With full Internet access, our agent can re-identify Hacker News users and Anthropic Interviewer participants at high precision, given pseudonymous online profiles and conversations alone, matching what would take hours for a dedicated human investigator. We then design attacks for the closed-world setting.

    Given two databases of pseudonymous individuals, each containing unstructured text written by or about that individual, we implement a scalable attack pipeline that uses LLMs to:- 1. extract identity-relevant features,- 2. search for candidate matches via semantic embeddings, and- 3. reason over top candidates to verify matches and reduce false positives...

    Our second dataset matches users across Reddit movie discussion communities; and the third splits a single user's Reddit history in time to create two pseudonymous profiles to be matched. In each setting, LLM-based methods substantially outperform classical baselines, achieving up to 68% recall at 90% precision compared to near 0% for the best non-LLM method.

    Our results show that the practical obscurity protecting pseudonymous users online no longer holds and that threat models for online privacy need to be reconsidered...

    The following prompt is used...

    Source: https://arxiv.org/pdf/2602.16800 [2026-02-18]

    ---

    I don’t know why people are so keen to put the details of their private life in public; they forget that invisibility is a superpower...~ Banksy

    Related: https://cloudflare.com/learning/ai/data-poisoning

  • Thank you... When I read "engrish"... my heart skipped a beat...

  • Will you PLEASE stop saying "coding is a practical use case"? This is the third appeal I've made on this subject. (Do you read your comments?) If you want bug ridden code with security issues which is not extensible and which no-one understands, then sure, it's a practical use case. Just like if you want nonsensical articles with invented facts, then article writing is a practical use case. But as I've pointed out already no reputable editorial is now using LLMs to write their articles. Why is that? Because it obviously doesn't work.

    Let's face it the only reason you're saying "coding is a practical use case" is because you yourself don't code, and don't understand it. I can't see another reason why would assume the problems experienced in other domains somehow don't apply to coding. Newsflash: they do. And software engineering definitely doesn't need the slop any more than anyone else. So I hope this is my final appeal: please stop perpetuating this myth. If you want more information on the problems of using LLMs to code, then I can talk in great length about it - feel free to reach out. Thanks...

    The point is, there has always been a trade-off between the speed of development and quality of engineering (confidence in the code, robustness of the app etc.) I don't see LLMs as either changing this trade-off or shifting the needle (greater quality in a shorter time), because they are probabilistic and can't be relied upon to produce the best solution - or even a correct solution - every time. So you're going to have to pick your way through every single line it generates in order to have the same confidence you would have if you wrote it - and this is unlikely to save time because understanding someone else's code is always more difficult and time-consuming than writing it yourself. When I hear people say it is "making them 10x more productive" at coding, I think, "and also 10x as unsure what you've actually produced"...

    You'll also need to correct it when it does something you don't want. Now this is pretty interesting, if you think about it. Imagine you provide an LLM a prompt, and the LLM produces something but not exactly what you want. What is the advice on this? "Provide a more specific prompt!" Ok, so then we write a more specific prompt - the results are better, but it still falls short. What now? "Keep making the prompt more specific!" Ok but wait - eventually won't I be supplying the same number of tokens to the LLM as it is going to generate as the solution? Because if I'm perfectly specific about what I want, then isn't this just the same as actually writing the solution myself using a computer language? Indeed, isn't this the purpose behind computer languages in the first place?...

    We software developers very often pull chunks of code from various locations - not just stackoverflow. Very often they are chunks of code we wrote ourselves, that we then adapt to the new system we are inserting it into. This is great, because we don't need to make an effort to understand the code we're inserting - we already understand it, because we wrote it...

    "You should consider combing through Hacker News to see how people are actually making successful use of LLMs" - the problem with this is there are really a lot of hype-driven stories out there that are basically made up. I've caught some that are obvious - e.g. see my comment on this post: https://substack.com/home/post/p-185469925 (archived) - which then makes me quite sceptical of many of the others. I'm not really sure why this kind of fabrication has become so prevalent - I find it very strange - but there's certainly a lot of it going on. At the end of the day I'm going to trust my own experiences actually trying to use these tools, and not stories about them that I can't verify.

    ~ Tom Gracey

    Source

    Absolutely... Thank you, from the very depths of my heart and soul... dear Tom Gracey, programmer, artist... for the marvel you do... for the wisest attitude, for the belief in in human... in effort... in art...

  • This application is a must to have in these countries, since there's just too many limitations without it. For example, in case you need to access a Bank abroad without the "PIN-Calculator" and SMS. Otherwise, there's digitalized ID Card option, which then supports NFC and common card readers you could connect to a portable USB card reader. Yet, it also requires a biometry to create one: https://www.migracija.lt/ (I want to get the personal identity card and/or the passport of the Republic of Lithuania...)

    Perhaps, we travel or live in too different regions, and where I usually adventure it's already required to have an ID, also frequently backed by biometric data, to be stored at Government's databases.

    This interactive map displays the presence of National IDs and electronic IDs, including biometric IDs, in countries globally.Source

  • Some civilian approaches to be mentioned is how the verification is handled in Lithuania, Latvia, and Estonia, for example:

    Smart-ID is the easiest, safest and fastest way to authenticate yourself online, register in e-services and sign documents...

    Using Smart-ID for personal identification is free, totally unlimited and you can download the app on all of your Android and iOS smart devices...Or, if you feel more comfortable doing it in a bank, take your national identification document like a passport or an ID-card with you and visit your local bank office for identity validation...

    What’s more, you can use Smart-ID to access e-services from your other devices too. Say you prefer to use a computer for your online banking and you have Smart-ID on your smartphone. No worries, you can use Smart-ID on both. You can login to e-services using your computer and the smart device, or the smart device only...

    Smart-ID can be used to log in to e-services, for online banking and for signing documents.

    Source: https://www.smart-id.com/

    ---

    Smart-ID itself has no age restrictions for its users – but age limits have been set by identity providers and depend on the Smart-ID account type and authentication method chosen...

    Creating a Smart-ID account for a minor requires a parent/legal guardian to authenticate their account...

    Don’t just click “continue”: read the instructions on the screen carefully and double check that all the information you enter is correct, and the whole process will be easy and stress-free... The child cannot continue with their registration until we’ve got one parent approval...

    Source: https://www.smart-id.com/help/faq

  • An incomplete port of the Scheme shell (scsh) was once available for Guile as a separate package. However this code has bitrotten somewhat. The pieces are available in Guile’s legacy CVS repository, which may be browsed at http://cvs.savannah.gnu.org/viewvc/guile/guile-scsh/?root=guile.

    For information about scsh see http://www.scsh.net/.

    This bitrotting is a bit of a shame, as there is a good deal of well-written Scheme code in scsh. Adopting this code and porting it to current Guile should be an educational experience, in addition to providing something of value to Guile folks.

    Source: GNU Docs

  • Holy smokes! Have you tried enabling "Blizzard" mode in "Black" theme, in the settings? ❄✨Ineffably... M-M-M-Marvelous... lous... lous... lous...No words...

  • May I ask what does "amadioh" mean?

  • Oh no no no no no...Please, God, Gods, or whoever, no...

    I absolutely don't want my descendants to talk with some void-empty limited bloody-meatground utter nonsense... I don't want that freaking awful mess of terribly limited data to talk with my children or their children possibly framing and damaging their true memories and genuine confidence in me I had been developing the whole life... I don't want them to remember the algorithm or some imitation of me talking with a machine or some chat bot... no... never... please no... PLEASE NO...No...No...Never...No...

    Some limited inhuman stupid chat/voice/avatar/anything bot? No...Some bot that may erroneously represent me behind my back?Never...Some nonsense that may reshape memories of my ancestors?No...Never...No...

    If I am dead, I am dead. I want my descendants to just remember me, talk to me in their memories, real videos, audios, and photos, my effort, my ideas and love in artwork if ever they'll be interested... and once in a while visit the grave, at least 2-3 times per their life, if ever possible... and that's it...

    If I am dead, I am dead as my ancestors are, who are not dead for me being alive but in my memories or something more magnificent/supernatural, and how I remember them, where they wanted to be the best they could, respected, glorified, and admired, without disturbing them in memories, soul, and the heart they gifted me, who I will always appreciate, respect, and love...

  • Since end-to-end encryption is still relatively new in commercial services, it seems that no one had ever examined it in detail before...Source

    Oh really?! Tell me about it!


    In addition to KeePass, some may find "Pass" interesting, that is based on GnuPG - https://www.passwordstore.org/

  • Microsoft said this new variation of ClickFix uses DNS as a "lightweight staging or signaling channel," enabling the threat actor to reach infrastructure under their control, as well as erect a new validation layer before executing the second-stage payload...Using DNS in this way reduces dependency on traditional web requests and can help blend malicious activity into normal network traffic...The downloaded payload subsequently initiates an attack chain that leads to the download of a ZIP archive from an external server...

    Source

  • Self-hosted deployments won't include any traces of Plutonium, and nothing is paywalled. You can still configure your own tiers and limits in the admin panel.

    Thanks for bearing with me. Development on Fluxer is about to get much easier, and the project will be made sustainable through community contributions and bounties for development work. Stay tuned – there's not much left now.

    I thought I could take it a bit easier while shipping this stabilising update, but Discord's recent announcement has changed things.

    As soon as the refactor is live, I'll interact more actively and push updates to this repository more frequently. The remaining parts of the refactor are currently being worked on and are being tested by a small group of testers before I'm comfortable pushing everything publicly. After that, all work will happen openly in public.

    Source

  • I am sorry...To support the case, I moved when got shadow-banned and never received any response:- https://lemmy.world/post/41927576/21676673

    Yet, Lemmy is sure a place, too... where you may get inhumanly banned just like a biomass, too... For example, relatively recently, I was banned on some Community for literally odd reason, and never got any response from their moderators in 2 private messages I sent regarding it:- https://lemmy.world/modlog...


    The ban record (I did absolutely nothing suspicious, I believe, and the account is months old):

    The private messages preview:

    The ban of my single message:

  • Considering the recent "third-party" data breach cases...