• 0 Posts
  • 49 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle






  • After several years of using Linux for work and school, I made the leap to daily driving linux on my personal computer. I stuck with it for two years. Hundreds of hours I sunk into an endless stream of inane troubleshooting. Linux preys on my desire to fix stuff and my insane belief that just one more change, suggested by just one more obscure forum post will fix the issue.




  • Something I often see missing from discussion on privacy is that it’s not always about you, the listener. Sometimes it’s about protecting the most vulnerable people around you. For example, someone escaping from domestic violence might have a different view on how their information is protected. People struggle to see the value in privacy because it’s not been a big problem for them personally or because they think it’s hopeless. An introduction to privacy in my view is all about teaching empathy, hope, and advocating for others.

    Once they have that goal in mind, you can tie in how open source helps empower people to take back their privacy










  • Relevant article: https://lemmy.ml/post/12857742

    Prompt engineering is a thing, but I wouldn’t say it’s much of a job title. There are people doing it: optimizing system prompts, preprocessing and postprocessing, llms are just one piece of a complex pipeline and someone has to build all that. Prompt engineering is part the boot strapping for making better llms but this work is largely being done by data scientists who are on the forefront of understanding how AI works.

    So is prompt engineering just typing questions? IDK. Who knows what those people mean when they say that but whatever it’s called there is a specialized field around improving AI tech and prompt engineering is certainly a part.


  • Renegade@infosec.pubtoMinecraft@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    3 months ago

    Containers are a really cool part of security. The security provided will depend on how the container is configured. For example if you give the container bridged networking permissions (or whatever equivalent term is used by your solution) then you’re giving the container access to communicate with other devices on your local network. This would be the opposite of what you want to do to prevent an attacker from pivoting through your LAN.

    Other threats just aren’t within the set of protections that can be provided by a container. For example if you wish to protect your Minecraft world from being griefed the container won’t have any affect on this. Another example is hiding your IP.

    Basically what I’m saying is that whenever you are looking at a security technology think about what guarantees it provides and realize that no single security measure provides protection against all threats.