What an amateurish way to try and make GPT-4 behave like you want it to.
And what a load of bullshit to first say it should be truthful and then preload falsehoods as the truth…
Disgusting stuff.
What an amateurish way to try and make GPT-4 behave like you want it to.
And what a load of bullshit to first say it should be truthful and then preload falsehoods as the truth…
Disgusting stuff.
Yes, it’s the next step and an evolution because it is far more of a trust less approach. With VPNs you need to trust your provider. If they “give you up” then you’re well and truly fucked. For I2P there is no way for a malicious node operators to parse out who is doing what. And the source code you can vet yourself so no need to trust it. Still if you have actors working together in the nodes, the torrent provider and at the ISP level then you can most certainly find a way to break the layer of secrecy. The barrier is however vast and so far police haven’t spent that much effort on piracy because it isn’t a serious crime in the eyes of the law. And I don’t foresee that they will for many years.
It’s also far more accessible than say Usenet and VPN+private trackers. Which is a very good thing for privacy in general.
Yes, it’s the next step and an evolution because it is far more of a trust less approach. With VPNs you need to trust your provider. If they “give you up” then you’re well and truly fucked. For I2P there is no way for a malicious node operators to parse out who is doing what. And the source code you can vet yourself so no need to trust it. Still if you have actors working together in the nodes, the torrent provider and at the ISP level then you can most certainly find a way to break the layer of secrecy. The barrier is however vast and so far police haven’t spent that much effort on piracy because it isn’t a serious crime in the eyes of the law. And I don’t foresee that they will for many years.
It’s also far more accessible than say Usenet and VPN+private trackers. Which is a very good thing for privacy in general.
Hmm, the 4:3 versions did make it to DVD but finding the old version for things is never easy. It’s a common wish however, in Anime circles in particular.
Looking at a predb over scene releases and going back as far as they go I see that the naming standard, as I suspected, didn’t hint at neither aspect ratio or resolution.
https://predb.net/search/south.park.s01?page=1
However if you look for DivX or Xvid releases I’d say it’s fairly likely they’ll be in 4:3 since Xvid by and large had gotten replaced by H.264 / X.264 by 2017 which is the earliest release I can confirm is going to be the remaster since it’s from the Bluray that released then:
https://www.dvdsreleasedates.com/movies/4399/South-Park-(TV-Series-1997-).html
The above is likely not fully complete so the remaster might’ve happened between 2004 and 2017, and this might be readily available information but I’m running out of time…
So basically my tip if you’re lazy is look for Xvid/DivX and cross your fingers. If you’re not then correlate the remaster date/release date to the predb and look for a scene release from before the remaster dropped.
That’s what I’m saying. It’s like everyone knows some college kids smoke pot from the smell in the dorms, but Police can’t legally search room by room to find out who it is, they need a search warrant which they need more than a general suspicion that someone in the dorms smoke to get.
Same with I2P, it’s done in a public setting so from traffic patterns we can be pretty sure someone is downloading a shit ton, and that it’s likely illegal content. Residential IPs have little reason to consistently download several GB files on a daily/weekly basis, streaming and download also look vastly different profile wise and at least no one I know of go to those lengths to try and mask their traffic patterns by trying to make streaming look like download or vice versa.
But as I said and you reiterated, you still need to crack the encryption to actually prove it in court. But given a specific target there are many ways to do that. A generic approach is likely not going to happen. Which means that I2P is secure much like having a secret chat in a crowded place like Grand Central Station in NY. You know that people are meeting there to chat about illegal stuff but you don’t know who. It becomes much easier if you know who to follow and eavesdrop on, but of course still not easy.
It is however nowhere near as safe as communication over channels that aren’t public to begin with. But such of course do not exist outside military and other special contexts.
But at the same time I2P is still built upon TCP/IP so it’s still like encrypted yodeling. Finding out who’s likely yodeling down movies is rather easy. The protection instead lies in the high barrier to prove exactly which movie and when so as to pass the barrier for court admissable evidence.
Now don’t misunderstand me, I2P is great stuff and I’ve used it on and off for years, but it shouldn’t be treated as the holy grail of safe and secure communication. Nothing can truly be that if it’s built on TCP/IP for fairly obvious reasons.
+1 for Genshin. While I think your gacha warning is excellent I do want to point out that the amount of resources you get for getting characters is more than enough to clear all story content. Hell if you’re a good player you could probably clear the whole game without using a single primogem, not even the countless thousands you get along the way.
And massive is also the understatement of the year. There is voiced content here that dwarfs even whole trilogies. I wouldn’t be surprised if there are more recorded lines than all of Dragon Age and Mass Effect put together. And the story is likely not even at the halfway point yet, there’s still years to go. Closest analogy would probably be SWTOR, the MMO, but with much better combat.
Hmm:
“Does not support desktop and mobile application connections, only supports use on browsers”
Regarding Docker deployment. It’s unclear if the application package for Linux supports usage together with the apps because that is a needed feature for me, to have everything centrally stored but easily edited via phone, and from experience the browser experience tends to be rather miserable.
I’ll for sure test it out when I have the time though, looks pretty feature complete if a bit overboard for just note-taking. This is not OneNote, this is more like Confluence.
My dream is something that can handle both seamlessly, I want to both take quick notes and have them easily searchable and indexed automatically while also supporting structuring knowledge in pages and sub-pages with rich content support.
1337x is probably the biggest these days and it just needs a free quick and easy account to upload a torrent. If you’re concerned about privacy then use a mail relay like Firefox Relay which is free.
I don’t know why the article doesn’t bring up Valve being the company to bring loot boxes and that business model to gaming as the prime example. Valve earns extreme money from the skins market and gambling in CSGO / CS2 since they sell the keys and take a cut of trades as well. They’re far more concerned with money than actually caring for the people involved. Gambling ruins lives and Valve is the gambling company that faces by far the least vitriol in that horrendous crowd.
I disagree because the biggest they did and continue to do is loot boxes. I argue that it was Valve that popularized that business model with CSGO and it is the most predatory shit that has ever entered the gaming sphere. It’s a complete cancer and Valves implementation is amongst the worst there is because of their market giving the items easily accessible real money value. This makes it not just like gambling in my extremely firm opinion, it makes it actual gambling. They’re also double dipping with the community market since it also takes a cut from aforementioned gambling. How Valve has escaped the vast majority of loot box hate is completely beyond me. And how they’ve managed to so far avoid a world wide crackdown on the unregulated gambling is also to me mind boggling. I despise Valve for this to the very core of my being because I know first hand how easily that shit can ruin lives and I know people that have got hooked and fucked up their life big time from CS skins. Left at the altar fucked up levels.
Ah, right, read to fast it seems! Though that still leaves the possibility of software firewalls, but any OOTB ones wouldn’t be doing any packet inspection.
In my experience beepers tend to be very simple. My cheap B-board, but major brand (MSI), only beeps when it POSTs. If it doesn’t post then there’s nothing. Good for when you’re using it headless but otherwise pretty pointless imo.
If thats true a lot has changed since AM4. Only the pricier B boards and not all X boards (but most) had them when I last kept tabs on the majority of boards. A cursory google shows at least a few solidly midrange boards with lights (and some without) so you may very well be right.
Only higher end boards tend to have diagnostic lights.
Do you have a firewall? Packet inspection in particular can wreak havoc on speeds.
Yes, which is exactly what I’m stating. Showing a forcibly non-upscaled video (or one where you’ve manually tweaked the upscaling for that matter) is likely not what you want because there are no circumstances where that is what you’d watch on that particular screen. It could perhaps work as an example of how that video would look if you had a 1080p monitor of the same size instead of the 4k one you have, since it scales in a linear fashion, a pixel of 1080p is 4 pixels in a square on a 4k screen. But that’s likely not what you want to test. Instead the thing you do want to test is “does it matter if I download X content in 1080p or 4k? How big is the difference really?” And if that is the question you need to let it upscale.
Not really possible. A 1080p video smashed into a 4k container (so it can actually represent the 4k part) would look worse than a true 1080p video file since that would get up scaled by your TV or monitor in most situations.
Best comparison would be making a playlist of the same video first in 1080p and then 4k.
Tell them to move to yubikey or similar hardware key which is far more secure than any password policy will ever be and vastly more user friendly. Only downside is the intense shame if you manage to lose it.
The key should stick with the user thus not be stored with the computer when not in use. The key isn’t harmless of course but it takes a very deliberate targeting and advance knowledge about what it goes to and how it can be used. It’s also easy to remote revoke. If you’re extra special paranoid you could of course store the key locked at a separate site if you want nuclear codes levels of security.
Gemini Ultra will, in developer mode, have 1 million token context length so that would fit a medium book at least. No word on what it will support in production mode though.