- 1 Post
- 6 Comments
liquefy4931@lemmy.worldto Ask Lemmy@lemmy.world•Why is open source software assumed to be secure?3·25 days agoAlso keep in mind that employees of companies that release closed source software are obligated to keep secret any gaping security vulnerabilities. This obligation usually comes with heavy legal ramifications that could be considered “life ruining” for many of us. e.g. Loss of your job plus a lawsuit.
Often, none of the contributors to open source software are associated with each other and therefore have no obligation to keep discovered vulnerabilities a secret. In fact, I would assume that many contributors also actively use the software and have a personal interest in getting security vulnerabilities fixed.
Check out this amazing video all about Teflon. I know, nearly an hour long… Worth it!
liquefy4931@lemmy.worldto Ask Lemmy@lemmy.world•why the hell cant men stay out of women-only spaces?3·1 month agoUpload a photo which includes your face and genitals, and AI will validate your age and sex!
liquefy4931@lemmy.worldto Showerthoughts@lemmy.world•Lemmy is a tech literate echo chamber11·1 month agoIt’s accurate though…
liquefy4931@lemmy.worldto Ask Lemmy@lemmy.world•Type of key? And how to get broken part out of lock?7·2 months agoLocksmith here. In a pinch, I’ve ground the back of a jigsaw blade down, leaving just the teeth on the blade (short enough to fit above the key). Jigsaw blades, especially those intended for metal, are hardened and will easily bite into just about any key, giving enough leverage to pull out the broken piece.
After I learned how LLMs function, the “AI” we use in reality was categorized within my mind as something entirely new and different from the fictional, cognizant, sapient artificial intelligence in my favorite novels.