tal

joined 11 months ago
[–] tal@lemmy.today 13 points 3 hours ago

Endoscope profile pics are the future.

[–] tal@lemmy.today 12 points 7 hours ago

I believe it's ICOM, not Baofeng.

https://www.jpost.com/middle-east/article-820735

What are the ICOM IC-V82 radios exploding in Lebanon?

On that note, one review on eham.net from twelve years back for this radio is amusing:

https://www.eham.net/reviews/view-product?id=5046

Watch out for fake v82's! Only buy from authorized retailers or someone who did.

[–] tal@lemmy.today 5 points 8 hours ago

The ~/.ssh/known_hosts file only contains public keys. I mean, maybe someone doesn't want to hand out the list of hosts that they talk to, but exposing it doesn't expose the private keys, which are what you really need to keep secret.

Those are in ~/.ssh/id_rsa or the like, depending upon key type.

[–] tal@lemmy.today 13 points 10 hours ago (6 children)

wordfreq is not just concerned with formal printed words. It collected more conversational language usage from two sources in particular: Twitter and Reddit.

Now Twitter is gone anyway, its public APIs have shut down,

Reddit also stopped providing public data archives, and now they sell their archives at a price that only OpenAI will pay.

There's still the Fediverse.

I mean, that doesn't solve the LLM pollution problem, but...

[–] tal@lemmy.today 38 points 13 hours ago* (last edited 13 hours ago) (7 children)

While 44.3 percent of union members polled between April 9 and July 3 backed Biden compared to 36.3 percent for Trump, polling in the wake of the Republican and Democratic Party conventions found the Teamsters members support Trump over Harris.

In a union-commissioned survey conducted by an independent third party between July 24 and Sept. 15, 59.6 percent of Teamsters members voted to endorse Trump, compared to 34 percent for Harris.

Teamsters members seem to have been dramatically more supportive of Biden than they are of Harris. Hmm.

Don't know if election models, like Five Thirty Eight's or similar, take endorsements as an input, whether that may affect their projection.

 

The International Brotherhood of Teamsters will not issue an endorsement in the presidential election for the first time since 1996, and for only the second time since 1960.

[–] tal@lemmy.today 22 points 20 hours ago* (last edited 19 hours ago) (23 children)

looks dubious

The problem here is that if this is unreliable -- and I'm skeptical that Google can produce a system that will work across-the-board -- then you have a synthesized image that now has Google attesting to be non-synthetic.

Maybe they can make it clear that this is a best-effort system, and that they only will flag some of them.

There are a limited number of ways that I'm aware of to detect whether an image is edited.

  • If the image has been previously compressed via lossy compression, there are ways to modify the image to make the difference in artifacts in different points of the image more visible, or -- I'm sure -- statistically look for such artifacts.

  • If an image has been previously indexed by something like Google Images and Google has an index sufficient to permit Google to do fuzzy search for portions of the image, then they can identify an edited image because they can find the original.

  • It's possible to try to identify light sources based on shading and specular in an image, and try to find points of the image that don't match. There are complexities to this; for example, a surface might simply be shaded in such a way that it looks like light is shining on it, like if you have a realistic poster on a wall. For generation rather than photomanipulation, better generative AI systems will also probably tend to make this go away as they improve; it's a flaw in the image.

But none of these is a surefire mechanism.

For AI-generated images, my guess is that there are some other routes.

  • Some images are going to have metadata attached. That's trivial to strip, so not very good if someone is actually trying to fool people.

  • Maybe some generative AIs will try doing digital watermarks. I'm not very bullish on this approach. It's a little harder to remove, but invariably, any kind of lossy compression is at odds with watermarks that aren't very visible. As lossy compression gets better, it either automatically tends to strip watermarks -- because lossy compression tries to remove data that doesn't noticeably alter an image, and watermarks rely on hiding data there -- or watermarks have to visibly alter the image. And that's before people actively developing tools to strip them. And you're never gonna get all the generative AIs out there adding digital watermarks.

  • I don't know what the right terminology is, but my guess is that latent diffusion models try to approach a minimum error for some model during the iteration process. If you have a copy of the model used to generate the image, you can probably measure the error from what the model would predict -- basically, how much one iteration would change an image or part of it. I'd guess that that only works well if you have a copy of the model in question or a model similar to it.

I don't think that any of those are likely surefire mechanisms either.

[–] tal@lemmy.today 4 points 22 hours ago* (last edited 18 hours ago) (1 children)

I don't much like scary games myself, but here's someone asking /r/HorrorGaming what their scariest games are:

https://old.reddit.com/r/HorrorGaming/comments/1303c5t/in_your_opinion_what_are_the_scariest_games_of/

EDIT: And yet somehow, despite not liking scary games, I've wound up owning some of these, like Darkwood, the Amnesia games, Clive Barker's Undying -- which I wouldn't call that scary -- Doom 3, Lone Survivor, Outlast, and Subnautica.

I've also played Clock Tower, which was on there.

[–] tal@lemmy.today 13 points 1 day ago

On the subject of the repeated murder attempts against him, he added: “There’s something going on. I mean, perhaps it’s God wanting me to be President to save this country.”

On one hand, the Almighty appears to have thrown several assassins at Trump but had them fail. One might take that as an expression of divine endorsement for Trump's leadership. But, then, on the other hand, He hasn't sent any against Harris.

Definitely a tough theological knot, that one.

[–] tal@lemmy.today 17 points 1 day ago* (last edited 1 day ago)

It doesn't look like anyone's built much by way of spacecraft intended to enter interstellar space recently.

https://en.wikipedia.org/wiki/List_of_artificial_objects_leaving_the_Solar_System

  • Pioneer 10, launched 1972, last contact January 2003

  • Pioneer 11, launched 1973, last contact November 1995

  • Voyager 2, launched August 1977, still active

  • Voyager 1, launched September 1977, still active

  • New Horizons, launched 2006, still active

All NASA projects.

There's one ESA-led project, Ulysses, launched in 1990, shut down in 2008. This is still in the solar system, but WP says that there's some chance that in November 2098, it may undergo a gravitational slingshot induced by Jupiter that will eventually send it out of the solar system.

And...looks like that's it. The sum total of what mankind has built to date that will make it out of the solar system. The last launch humanity did towards interstellar space was 18 years ago.

[–] tal@lemmy.today 8 points 1 day ago* (last edited 1 day ago) (3 children)

looks at list

Microsoft's list of allocated names apparently includes:

  • Crimson Sandstorm

  • Diamond Sleet

  • Ghost Blizzard

  • Leopard Typhoon

  • Luna Tempest

  • Night Tsunami

  • Silk Typhoon

  • Star Blizzard

This does not pass my basic sniff test of being able to tell whether a name is a group from a hostile intelligence agency or the latest Razer gaming product, a cyberpunk video game gang name, or a video gaming guild name.

https://robinpiree.com/blog/guild-names

  • Twilight Vanguard

  • Crimson Shadows

That's too similar in my book.

[–] tal@lemmy.today 14 points 1 day ago* (last edited 1 day ago)

That characteristic sound you hear associated with falling bombs in movies and such was originally a noisemaker on World War II German dive bombers and bombs intended to intimidate soldiers on the receiving end.

https://www.slashgear.com/1370552/stuka-siren-ju-87-noise-explained/

As well as saving the Stuka from early retirement, it is thought that Ernst Udet also suggested its most famous feature — the siren (some sources say that this was an intervention by Hitler himself). The sirens were fitted to the legs of the plane's fixed undercarriage. They were driven by propellers that spun in the airflow, and could be activated and deactivated from the cockpit.

The psychological effect of the siren was best explained French general Edouard Ruby, who reportedly said that on hearing the terrifying wail, his infantrymen "cowered in the trenches, dazed by the crash of bombs and the shriek of the dive bombers." But many Stuka pilots also didn't like them. The sound was just as audible in the cockpit of the Stuka as it was to forces on the ground, and the bulky sirens added weight and reduced the speed of the already slow bomber. Reportedly, some squadrons fitted simple air whistles to the Stuka's bombs instead, creating the famous "falling bomb whistle" that Hollywood still insists that all ordnance makes as it plummets to earth.

Both the Stuka's terrifying wail and the falling bomb whistle became so famous that they have since become standard stock sound effects in movies, used whenever any airplane dives at high speed or any bomb is dropped. But, unless you're old enough to have been on the battlefields of Europe in the very earliest days of WWII, these are sounds that you'll only ever hear in movies now.

Stuka dive sound:

https://www.youtube.com/watch?v=UQzv-8pJSqY

Falling bomb whistle:

https://www.youtube.com/watch?v=zlsHYKkmHoI

Maybe one could do the same thing with grenades.

[–] tal@lemmy.today 21 points 1 day ago (8 children)

Russia is not alone in its activity. Microsoft also saw efforts by a China-linked group, known as Storm-1852

rolls eyes

You give them a cool name, you make them sound cool.

Just do the plain ol' number thing. Let them do their own marketing work if they want marketing.

https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/understanding-threat-actor-naming-conventions.html

While APT43’s link with the North Korean government was confirmed for the first time in the Mandiant report, the threat actor was already known by threat analysts under other names, such as Thallium, Kimsuky, Velvet Chollima, Black Banshee and STOLEN PENCIL.

This confusion comes down to each cyber threat intelligence (CTI) vendor operating its own attribution process for cyber-attacks – something we recently investigated on Infosecurity Magazine.

The most prominent threat group name is the Advanced Persistent Threat (APT). Commonly used by the whole CTI community, including US non-profit organization MITRE, which provides a standardized framework for tactics, techniques and procedures (TTPs), APT groups refer to clusters of sophisticated threat actors sponsored by, or acting on behalf of a government.

With geopolitical rather than financial motivations, APT groups typically operate cyber espionage campaigns and destructive cyber-attacks.

Once a threat actor has been confirmed to be a coherent group of hackers backed by a nation-state, the threat analysts who lead the cyber attribution allocate it a new APT number – the latest being APT43.

Other ‘sober’ naming conventions exist, consisting of codenames and numbers only. For example, APT-C groups are Chinese cybersecurity vendor 360 Security Technology’s equivalent to APT groups. APT-C numbers are sometimes used by other vendors.

Others, like MITRE’s G[XXX] (e.g. G1002) or SecureWorks’ legacy TG-[XXXX] (e.g. TG-3279), are mere identification numbers and their names do not reveal anything about the threat actor.

“We use a sober, or even dull, naming convention because we don’t want to glamorise those groups,” Collier added.

What is this, a Microsoft naming scheme?

kagis

Sounds like it.

https://blogs.microsoft.com/on-the-issues/2024/09/17/russian-election-interference-efforts-focus-on-the-harris-walz-campaign/

A Chinese-linked influence actor Microsoft tracks as Storm-1852 successfully pivoted to short-form video content that criticizes the Biden administration and Harris campaign before some of its assets disappeared from social media following reports of its activity. While most Storm-1852 personas masquerade as conservative US voters voting for Trump, a handful of accounts also create anti-Trump content and use political slogans and hashtags associated with American progressive politics.

 

I am not very interested who Nate Silver will vote for; I am not very enthusiastic about Newsweek's choice of title. I think that's probably by far the least-worthwhile piece of information in the article.

But what I do think is interesting is that he's got an assessment of the impact of the presidential debate up:

He also discussed the candidates' win probabilities following their debate on Tuesday: "Before the debate, it had been like Trump 54, Harris 46. These are not vote shares. These are win probabilities. And after, it's 50-50," Silver said.

"She, right now, is at 49 percent of the vote in polls," Silver said on the podcast. "To win, she has to get to 51 percent—51 because she has a disadvantage in all likelihood in the Electoral College."

Despite having previously shown Trump as surging in the polls, Silver's model now has him neck and neck with Harris.

 

Some California House Democrats don’t want the process to replace the president on the ticket to seem like a Kamala Harris coronation.

 

The giant viruses might infect algae that are increasing Greenland's ice melt. These viruses could help kill off the damaging algal blooms, helping to reduce some of the impacts of climate change.

 

The James Webb Space Telescope has found carbon in a galaxy just 350 million years after the Big Bang. That could mean life began much earlier too, a new study argues.

 

Icelandic authorities said residents and emergency responders should be ready to evacuate Grindavík at short notice after a new and ongoing eruption on the Reykjanes Peninsula.

 

A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a hidden backdoor that maintained persistent communication with a malicious website, researchers reported Thursday, in the latest episode of a supply-chain attack.

view more: next ›