• 0 Posts
  • 21 Comments
Joined 1 year ago
cake
Cake day: June 20th, 2023

help-circle





  • Some people decided that they needed a buzzword for something that have absolutely nothing to do with the web, and they decided to use Web3.

    Anything “web3” you can think of is a regular webservice, that have no technological difference with “web2” (whatever this was), and may or may not behind the scene communicate with some form of blockchain (which may or may not be a real one too).

    That’s web3. And note that I didn’t even bother to go check what happens on the blockchain side, that is already so removed from the web it’s insulting people calls this web3.


  • You can factory reset it, but not really. On first boot, the phone requires a network connection; you can’t skip setting up wifi if there is no cellular internet available. And it will ask you to authenticate the google account it expect before even starting the “real” setup process. As a matter of fact, once you authenticate with google, it does start again, ask again for wifi and will not have the account setup at all, as you would expect after a factory reset.

    So, while you can “factory reset”, the phone still needs the previously registered google account to start. There’s probably some phone that gives more leniency, but I was not able to circumvent that using adb (the device being locked, and impossible to unlock without accessing the menu, impossible to access without starting in the first place…)


  • With both whatever-apple-is-doing and Android’s whatever-it-is-called-that-prevent-factory-reset when you don’t have access to the account on the device, I don’t see how people still buy “shady” phones and tablets.

    Last time I borrowed a relative’s phone to run an experiment, I had to contact them to “unlock” the phone after a factory reset before being able to do anything because I didn’t remove the account before. Unless people go out of their way to make their phone “stealable”, that is.


  • Yes, there is. And yes, it would be huge. I know a lot of people that are staying away from all this as long as the privacy issues are not resolved (there are other issues, but at this point, the cat is out of the bag).

    But running large models locally requires a ton of resource. It may become a reality in the future, but in the meantime allowing more, smaller provider to provide a service (and a self-hosted option, for corporation/enthusiasts) is way better in term of resources usage. And it’s already a thing; what needs work now is improving UI and integrations.

    In fact, very far from the “impressive” world of generated text and pictures, using LLM and integrations (or whatever it is called) to create a sort of documentation index that you can query with natural language is a very interesting tool that can be useful for a lot of people, both individual and in corporate environment. And some projects are already looking that way.

    I’m not holding my breath for portable, good, customized large models (if only for the economics of energy consumption) but moving away from “everything goes to a third party service provider” is a great goal.











  • The library itself is very common and used by a lot of things (in this case it seems that the payload only activated when used by specific programs, like SSH).

    What you can do about it is keep your system up-to-date using your distribution update mechanisms. This kind of thing, when found out, is usually fixed quickly in security updates. In Mint (which I don’t use, but I believe is based on either debian or ubuntu, which uses dpkg/apt) security updates are flagged differently anc can be installed automatically, depending on your configuration.

    tl;dr: keep your system up-to-date, it will keep known vulnerabilities away as much as it can;