jeffhykin

joined 1 year ago
[–] jeffhykin@lemm.ee 15 points 1 day ago* (last edited 1 day ago) (1 children)

Labeling datasets is costly process. When you dont opt out, you're letting them build a labelled dataset on you-specifically for free.

[–] jeffhykin@lemm.ee 41 points 1 day ago* (last edited 1 day ago) (3 children)

Same for me: just say no, and they say OK. Effortless but the option is totally invisible.

The irony is, I've seen the staff stop using the face scanner for everyone halfway through the line to speed things up. So its not saving time, just costing money to increase surveillance.

[–] jeffhykin@lemm.ee 3 points 1 day ago

Ignore the name (neural networks might as well be a footnote). A more appropriate title would be "generic problems and algorithms".

(Artificial Intelligence: A modern approach by Russell and Norvig)

https://github.com/Youquan1/Artificial-intelligence-books/blob/master/Artificial%20Intelligence%20A%20Modern%20Approach%20-%20Stuart%20J.%20Russell%20%2C%20Peter%20Norvig.pdf

[–] jeffhykin@lemm.ee 4 points 1 day ago* (last edited 1 day ago)

I agree, and here's a few different avenues of examples:

  1. If trying to get past interviews, Leet code and hacker rank can be great. They're not so great for real world problems, but not bad.

  2. Advent of code is a good middle ground between theory and practice in my opinion.

  3. To really learn real world problem solving, I'd recommend implement a specification, without looking at existing implementations. For example, make a basic regex engine (formal Regular Expressions not PCRE expressions), or try to implement the C Preprocessor, or the JS event loop.

[–] jeffhykin@lemm.ee 6 points 2 days ago* (last edited 2 days ago)

"Algorithms to live by" https://www.amazon.com/Algorithms-Live-Computer-Science-Decisions/dp/1627790365

Less technical than you probably want, but it is useful for mapping real world problems to known algorithms.

[–] jeffhykin@lemm.ee 1 points 6 days ago (1 children)

Yeah, cookies, account logins, and other stuff make it hard too. Ex: randomly exploring gmail emails at different times of day, but not actually marking emails as read.

[–] jeffhykin@lemm.ee 3 points 6 days ago* (last edited 6 days ago)

Psychology. Ever see ring doorbell footage where the owner says "drop the package" and people do? Its not like the owner could do anything, but for some reason it makes people behave differently.

 

Fingerprinting isn't always possible to defeat, and its not always possible to avoid making accounts (work and school accounts)

However, it should be possible to fill up tracked data with meaningless garbage and reduce the signal-to-noise ratio. Ex: a bot that browses random products on amazon to reduce profiling accuracy.

Do you guys know of any tools that do this? Anything from browser extensions to command line scripts, to anonymous group-accounts.

[–] jeffhykin@lemm.ee 2 points 1 week ago* (last edited 1 week ago)

Here's a very similar question I asked here a few months ago: "Privacy respecting ring doorbell" https://lemm.ee/post/8165932

[–] jeffhykin@lemm.ee 3 points 1 week ago (1 children)

The clients are source available for telegram though

[–] jeffhykin@lemm.ee 10 points 1 week ago* (last edited 1 week ago) (1 children)

I mean technically the client is verifiable if you use discord in a browser tab... and verify it every time you load the web page... 🙃

25
submitted 2 months ago* (last edited 2 months ago) by jeffhykin@lemm.ee to c/privacy@lemmy.ml
 

I'm asking for existing tools/systems that let me programmatically say: "here is my public key, BUT if each of these 5 other public keys all send a signed message saying that my public key has been compromised, then you should mark my public key as compromised, and use the new one they provide". (This is not for a particular task, I'm just curious if any existing auth systems are capable of this)

I call the idea "guardian keys" because it could be friends' public keys or or just more-securely-stored less-frequently-used keys that you control.

NOTE: I know this would not work for data encryption. Encrypted data is simply gone if a key is lost. But, for proving an identity, like a login, there could be a system like this but I don't know of any

 

I don't think I've seen any solarpunk art (much less real world construction) with transparent wood, so I wanted to share

Not only is transparent wood real but apparently it has been around in labs for a bit. Take a look! (And let me know if this is old news for you)

Article: https://arstechnica.com/science/2023/12/why-scientists-are-making-transparent-wood/

Wikipedia with video: https://en.m.wikipedia.org/wiki/Transparent_wood_composite

Original paper publication: https://45-79-48-20.ip.linodeusercontent.com/s/trDsHKKWwsHsQZ5

 

Why doesn't every computer have 256 char domain name, along with a private key to prove it is the sole owner of the address?

Edits: For those technically inclined: Stuff like DHCP seems unnecessary if every device has a serial number based address that's known not to collide. It seems way more simple and faster than leasing dynamic addresses. On top of that with VOIP I can get phone calls even without cell service, even behind a NAT. Why is the network designed in such a way where that is possible, but I can't buy a static address that will persist across networks endpoint changes (e.g. laptop connecting to a new unconfigured wifi connection) such that I can initiate a connection to my laptop while it is behind a NAT.

  • Yes, it would be a privacy nightmare, I want to know why it didnt turn out that way
  • When I say phone number, I mean including area/country code
  • AFAIK IP addresses (even static public ones) are not equivlent to phone numbers. I don't get a new phone number every time I connect to a new cell tower. Even if a static IP is assigned to a device, my understanding is that connecting the device to a new uncontrolled WiFi, especially a router with a NAT, will make it so that people who try to connect to the static IP will simply fail.
  • No, MAC addresses are not equivalent phone numbers. 1. Phone numbers have one unique owner, MAC addresses can have many owners because they can be changed at any time to any thing on most laptops. 2. A message can't be sent directly to a MAC address in the same way as a phone number
  • Yes, IMEI is unique, but my laptop doesn't have one and even if it did its not the same as an eSim or sim card. We can send a message to an activated Sim, we can't send a message to an IMEI or serial number
 
  • I make websites
  • If someone is banned twice (two accounts) I want it to take them more than 5min and a VPN to make a 3rd account
  • I'm okay with extreme solutions, like requiring everyone to have a Yubikey-or-similar physical key
  • I really hate the trend of relying on a phone number or Google capcha as a not-a-bot detection. Both have tons of problems
  • but spam (automated account creation) is a real problem

What kind of auth should I use for my websites?

 

Often we dig our own grave making people "defend" their opinion. Instead of winning them over, we push them to become more and more entrenched in their opinion as they build larger mental defenses against the challenges we present. So I want to hear from you:

How do you avoid putting people on the defensive? (Even though those people had a strong alternative opinion)

What was a time where the opposite happened; all the facts were there, but absolutely no one was convinced by the talk?

I feel like solarpunk has a lot of obvious-once-seen ideas and powerful "ahh-ha" moments. But if we can't convince others to take a glimpse from our perspective, not much benefit will come from it.

31
submitted 7 months ago* (last edited 7 months ago) by jeffhykin@lemm.ee to c/programming@programming.dev
 

My friends and I did this a while ago and it was quite fun.

 

JSON and YAML work great for passing data between languages.

However, sometimes, I have a pure function like y = mx + b, that I would like to pass between languages (for making plots).

What operators should be available? I think jsonnet's standard library(skip to the math operators) is the perfect example of a useful set of operations that could be shared across basically all programming languages. The operations would take/return json values rather than working with language-specific data types.

My question is does such a language exist already?

Close candidates:

  • Dhall and jsonnet are pure languages that generate json. But AFAIK they can't actually serialize pure functions. They can only use pure functions as a shorthand for generating json. I want to actually save/send functions over the wire.
43
submitted 9 months ago* (last edited 9 months ago) by jeffhykin@lemm.ee to c/asklemmy@lemmy.world
 

This might be a limitation of Lemmy or voyager, but is there some option for me to "watch" or "subscribe" to a post and be notified of new comments?

Especially relevant to asklemmy since occasionally I see a post before there's any answers.

10
submitted 10 months ago* (last edited 10 months ago) by jeffhykin@lemm.ee to c/adhd@lemmy.world
 

I'd like a small group with strict/well-defined meeting times that has a coach/conversation-conductor to keep topics on track. I feel like it would work really well if advice was given/received by others with ADHD, while having a leader do stuff like

  • make sure 1 person doesn't dominate the conversation
  • keep meeting notes
  • call/text people who miss a meeting
  • follow up with people who said they were going to do something

But I've never really heard of such a system.

I've found at least two online services, but I don't really know if they're worth trying. I'm curious on your opinion and/or if any of you have tried something similar.

There's "Study Hall" which I'm not sure is what I'm really looking for https://adult-study-hall-by-adhd-rewired.mn.co/sign_up?plan_id=230880

Then this site seems to have good coaching https://news.ycombinator.com/item?id=37252231

25
submitted 10 months ago* (last edited 10 months ago) by jeffhykin@lemm.ee to c/fediverse@lemmy.world
 

If a human posted every 5 min, got 0 upvotes for 20 posts straight, we would ban them for spam. If bots would limit themselves to posting once a day, or once a week, and only post the top-voted non-duplicate post of that timeframe, it would be a dramatic improvement. For once, we might actually see real-lemmy posts along side bot posts, instead of the community being exclusively bots (or 99% bot posts) or exclusively Lemmy users.

I would tell the bot creators myself, except I don't know how to get in contact with them. Is there a consistent way to contact a bot creator?

22
submitted 10 months ago* (last edited 10 months ago) by jeffhykin@lemm.ee to c/solarpunk@slrpnk.net
 

I plan to speak to my city council about creating a tool library, where citizens use their existing library card to checkout tools. To make the idea a bit more robust, I'm also planning to require citizens deposit something as collateral when checking out a tool.

However.

I live in Texas (I love Texas). Thankfully my city council is receptive, but I know they're going to need compelling evidence before approving something like this.

So, if you guys have any advice, or examples, particularly of this kind of system working in the US, I would love to hear about it!

view more: next ›