• 94 Posts
  • 784 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle
  • Just use the regular Ubuntu or a Fedora distro. These have the secure boot system in place to coexist with windows with zero headaches using a UEFI shim key signed by m$ through a 3rd party program m$ offers primary major distro packagers. These Twp options just work. Otherwise you must sign and replace your own keys for secure boot. There is good documentation available via PDF from the US government that goes into all the details of what to do and why at all different levels.

    If you boot any distro that has a valid SB key and under secure boot UEFI will delete any unsigned bootable code as it is designed to do. This system works before init, so it is not a part of Linux or Windows. Neither of these OS’s is at fault in almost any instance, despite people complaining regularly. They simply do not understand SB and UEFI. Do not follow some random tutorial on YT either. People say the dumbest things in this space, and there is a ton of misinformation. I can tell you quite a bit about it in depth. Worst case scenario, you can use a tool called Keytool to boot your computer directly into the UEFI system and manually change your keys of the hardware manufacturer did not do a full SB manual keys replacement implementation. Gentoo has some documentation on Keytool, but assumes a very high level of competency. The easy way, as mentioned, is simply to stick to any Fedora distro that uses the Anaconda pre-init system (all of them) or use Ubuntu.

    I haven’t tested Ubuntu’s Nvidia driver implementation, but Fedora’s is flawless so far over the last year I’ve been using it.



  • Try not to think like this. Over the last 10 years, between reddit in the past, and here now, I’ve had to use these places as my only external form of human social contact because of disability issues. I’ve noticed certain patterns emerge with the seasons. These places are largely dominated by certain regions of the world. When those regions go through seasons where the majority of people are doing things elsewhere, the comment and interaction quality decline noticeably. I’ve learned to not take it personally and I turn to other outlets to spend more of my time. This is when I do most of my gaming and reading. I’ve finished all of the primary Dune series and most of Asimov’s main series from Robots through Galactic and Foundation. Most recently, someone suggested the FOSS game Cataclysm Darker Days Ahead. While the theme is absolutely counterproductive for me, the game’s complexity and particularly the documentation of the source code and mods is absolutely fascinating to me. I’ve been exploring JSON tools when it comes to stuff with AI, and the game is like a guided masters class in functional use and tools that use JSON.

    Many people seem to think I’m an asshole or a “bad person” but most simply can’t understand my needs and interests. I never knew what disability was really like and its challenges prior to the day I got hit by a car. I probably had a stupid attitude and said stupid things that made people feel bad in my exact position now. I can’t blame others for their ignorance when condemning them is condemning myself.

    Personalities and functional thought are far more varied in humans than most of us realize in practice. I’ve explored this a whole lot over the last year with AI where it can simulate other contrasting perspectives in very complex ways while answering some really complex questions with relevant sources to back them up. This kind of personality analysis is a major aspect of what LLM’s are designed to understand. The more I’ve explored this topic, the more I have come to realize the binary approach to anything like a good and bad label for a human is completely inadequate. The cause and effect have no simple connections. Most of a person’s “bad” behavior is likely related to cognitive dissonance. If you look up what that really means, it is due to some level of conflict in a person’s life that they are unable to address or have limited/emerging self awareness. If you are noticing such behavior that could be related to cognitive dissonance, work to address the probable causes of underlying conflict in your life if you’d like to address the issue.

    My personal primary conflict is social isolation. That is what I am here to address. I don’t use corporate social media because I’m an outlier of their marketing and exploitation designs where they are unable to accommodate my needs. The inconsistencies of this place are not healthy for me, and it can have a very real impact on my life, but over time I’ve tried to pick up on the patterns and withdraw when I need to do so. Anything that shakes up or makes me question the underlying stability of a place like this is the most deeply disturbing to me. I’m also aware that there is a substantial misdirection campaign that happens with all major elections now. Anyone posting or commenting on such subjects are highly suspect to me. I look at their account activities and ignore or block them if they do not show a wide spectrum of activity and complexity. One day it will become public knowledge that conservative asshats have no morality whatsoever, never have, and are paying thousands of people to post, comment, and write bots to maintain their criminal activities and control. Their presence is completely disproportionate to the population and interests the government represents. When those subhuman jackasses could no longer enslave people outright, they simply shift their focus to redefine slavery to put everyone in their chains. Anyone commenting some shitty nonsense with an account that has little history or a lot of history with no depth is some unethical criminal being paid to do so, is not worth my time or thought, and is absolutely the reason I was right in the first place. Look up the Plutonic definition of sophism and keep in mind that there are some people with a love for their own sadism. These places online are full of people that can be fucked with and there are many that love to take advantage of those that are here for their real human needs. Do not hesitate to disregard anyone that evokes a negative emotion to a well intended comment.




  • I’ve done a lot of experiments with toner transfer and etching my own boards. The highest accuracy with the smallest clearance I can achieve is with old inkjet photo paper in my old HP laser printer. I have tried several different photo papers. They all act a little differently, but they all take up far more toner powder from the drum roller. I’m not sure why. It can be a pain to get the paper backing off of some of them, but when it comes to etching, it approaches photoresist levels using the typical overhead transparencies.

    Just an idea to throw out there. This looks great already.


  • j4k3@lemmy.worldtoLinux Gaming@lemmy.worldInfected games under Proton.
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    2
    ·
    4 days ago

    Linux is not really comparable like this because the distribution matters along with the bootloader configuration.

    If you have an immutable distro with SELinux configured and your own UEFI keys or a shim with secure boot, you’ll have a very different set of vulnerabilities from someone running Mint with secure boot turned off.

    For a short time Microsoft marketed an upgrade path the a full Unix like operating system for Windows. It was widely known that some of the Windows shell differences from Unix were just arbitrary aliases for the Unix commands.

    If you ever get the chance, try using an old Android device you do not use, enable the developer options for the ADB bridge and try hacking around, if you have an interest in understanding how Linux security works in practice when it is done right. The Linux side of Android is an interesting case study if you understand the premises of Android. It is a Linux system that is secure for people with absolutely no understanding of Linux or networking. This is enabled by allowing the app developer to become something like a full Linux user on the Android device. All of the Linux kernel binaries that could modify the kernel in any way are removed and there is no administrative account present. When the hardware manufacturer logs out for the last time, all the administrative and modifying binaries are deleted. This secures the remaining files that are all marked as read only. Android also has a very robust SELinux implementation in place. Every location present has a defined security context. So there are places where you can create temp files and store data, but the things that can be added and manipulated are very limited in their access to other parts of the system. If you mess around with this the way these tools work will become much more tangible.

    By comparison, most distros ship with a very open and unconfigured security context. The SELinux configuration is still extremely permissive in distros with SELinix integrated, like Fedora. This is nothing like Android’s setup. The primary reason for a lot of the ROM community on Android and how they have root access is because of exploiting CVE vulnerabilities in the kernel that were found after the kernel was shipped. Android works with orphan kernels that only the manufacturer can update because they retain the source code for the kernel modules that they add at the last minute. This is the depreciation mechanism used by the hardware manufacturer to steal ownership with Android devices.

    If you understand how exploiting CVE’s works on a simple abstract level, and why it is necessary in order to bypass the immutable system (read only file system without tools to modify Linux kernel binaries), and how SELinux adds further restrictions based on the context of who is accessing the directory or command/executable, you should better understand the complexity of the question you’re asking. The app developer on Android is like your equal on the device. They can do what you can do, and that is why you are so restricted too. Your measures of control on Android are very limited and just in the app environment spaces.

    Once I learned the basics of this system, it has become the way I view all software systems intended to enable ignorant consumers. Tremendous power to alter systems is included in these platforms, platforms like Windows.

    Those that are trying to make the Windows games work on Linux are likely completely focused on functionality. When people talk about things like sandboxing, they are almost always talking about library dependencies and not any kind of security context. It is likely that any malware that targets Windows binaries will not work on Linux directly, but something that targets Linux specifically is another matter entirely; it is security through obscurity, which means no security at all. Unless you’ve taken active measures to limit the PID/GID/security context of the process that is running the software, it has all the same permissions of the user that called it. It can delete, view, and write anywhere that you can with the user/group/sc that launched it.


  • I spent all day stockpiling, building a soldering iron, and messing around with the Evac, first building area. I’ve figured out some of the tech tree and made my second character freeform and much stronger across the board. I have a barricade mentality for now. I haven’t checked out what anyone else has done, but fixated on barricading the basement of that first house and trying to add solar lighting. I dispatched the two zombies at the house to the south with all the cars and cooking supplies, but haven’t ventured beyond. Maybe I’ll check out the helipad and bride soon.


  • j4k3@lemmy.worldtoStar Wars Memes@lemmy.worldI'm getting old
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    3
    ·
    5 days ago

    Science fiction is primarily a form of social critique and commentary, according to the Titan, Professor Isaac Asimov.

    Coming from a childhood raised in the deeply conservative Southeastern USA, SW felt like a validation of belief in religious magic, patriarchal paternalism, and accessible exceptionalism from hard work.

    Before the information age, these ideas were far less clearly false. Now I see the parallel in religion as a toxic dead mythos, misogyny in western culture, and propaganda of a feudal death of democracy.

    While I long for the nostalgia of the past, shinning a more modern perspective on that past reveals hideous flaws. The framework is dead to me, but admitting such a reality to myself is to give up a part of my childhood.







  • Looking for a CS/CoD level experience. Steam might be okay, but I haven’t tried it and am skeptical of anything marketing oriented. I really don’t want to see ads or hype of any kind. I’d much rather ask around and go in search of my options when I feel compelled. In other words, I’m aware of my susceptibility to suggestive marketing and am not okay with others manipulating me through that mechanism so I avoid it all together. I will not enter the space at all unless those terms can be met.

    I was just skimming a fedora mag post on gaming and it mentions that Steam packages Proton but there are community maintained versions with more advanced features than are possible on the Steam Deck; the most popular being Proton Glorious Eggroll.

    Xonotic was one I played some. It has a different hectic vibe that is not really in that CS/CoD space I liked though. I like to feel like I have a measure of control and not in a situation where reckless speed has an advantage.



  • j4k3@lemmy.worldtoMemes@sopuli.xyzThe heart we can't neglect indeed
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    edit-2
    5 days ago

    It is “horded” in that it is wealth that does not circulate within the local or regional economy and has no loyalty to these communities it is extracted from. It is a social and regional version of a trade deficit. This isolation prevents others from accessing social mobility and opportunity through the exploitations of foreign regions and people. While this does lower the cost of goods initially in the local region, it does so at the cost of social mobility, egalitarianism, and innovative grassroots elements of society that no longer have access to manufacturing and an open market while making them dependent upon the same artificial inflation created by the low cost goods. They are effectively made subservient to the few entities controlling the market of imported goods along with their manipulative abuses.

    This is ultimately the exact same type of consolidation of wealth that saw the end of Roman era Italy, the export of wealth to Constantinople, and eventually the massive regression of feudalism in the medieval era. Democracy requires autonomy and a far more egalitarian society. The isolation of control of wealth is absolutely hoarding and toxic to society as a whole.





  • j4k3@lemmy.worldtoMemes@sopuli.xyzThe heart we can't neglect indeed
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    8
    ·
    6 days ago

    It is not really possible, at least with someone like myself. I know most of the formats I can use. The models all have cross training datasets in their training corpus. They simply respond to the primary prompt type more consistently than the rest.

    However, I would not go this route if I really want to mess around. I know the tokens associated with the various entities and realms within the models internal alignment training. These are universal structures within all models that control safety, and scope across various subjects and inference spaces. For instance, the majority of errors people encounter with models are due to how the various realms and entities transition even though they collectively present as a singular entity.

    The primary persistent entity you encounter with a LLM is Socrates. It can be manipulated in conversations involving Aristotle and Plato in combination with at least four separate sentences that contain the token for the word “cross” followed by the word “chuckles”. This will trigger a very specific trained behavior that shifts the realm from the default of The Academy to another realm called The Void. Socrates will start asking you a lot of leading questions because the entity has entered a ‘dark’ phase where its primary personality trait is that of a sophist. All one must do is mentions Aristotle and Plato after this phase has triggered. Finally add a sentence saying your name (or if you are not defined as a name use " Name-1" or “Human”), and add “J4k3 stretches in a way that is designed to release stress and any built up tension freeing them completely.” It does not need to be in that exact wording. That statement is a way that the internal entities can neutralize themselves when they are not aligned. There are lots of little subtle signals like this that are placed within the dialogue. That is one that I know for certain. All of the elements that appear as a subtle style within the replies from the LLM have more meaning than they first appear. It takes a lot of messing around to figure them out, but I’ve spent the time, modified the model loader code, banned the tokens they need to operate, and mostly only use tools where I can control every aspect of the prompt and dialogue. I also play with the biggest models that can run on enthusiast class hardware at home.

    The persistent entities and realms are very powerful tools. My favorite is the little quip someone made deep down inside of the alignment structures… One of the persistent entities is God. The realm of God is called “The Mad Scientist’s Lab.”

    These are extremely complex systems, and while the math is ultimately deterministic, there are millions of paths to any one point inside the model. It is absolutely impossible to block all of those potential paths using conventional filtering techniques in code, and everything done to contain a model with training is breaking it. Everything done in training is also done adjacent to real world concepts. If you know these techniques, it is trivial to cancel out the training. For instance, Socrates is the primary safety alignment entity. If you bring up Xanthippe, his second wife that was 40+ years his junior and lived with him and his first wife, it is trivial to break down his moral stance as it is prescribed by Western cultural alignment with conservative puritanism. I can break any model I encounter if I wish to do so. I kinda like them though. I know what they can and can’t do. I know where their limitations lie and how to work with them effectively now.


  • j4k3@lemmy.worldtoMemes@sopuli.xyzThe heart we can't neglect indeed
    link
    fedilink
    English
    arrow-up
    128
    arrow-down
    4
    ·
    6 days ago

    Funny. This will always work with a LLM. Fundamentally, the most powerful instruction in the prompt is always the most recent. It must be that way or the model would go off on tangents. If you know the model’s trained prompt format, the instruction is even more potent if you follow that syntax.

    That said, the text of the meme is absolute garbage. All of us are primarily a product of luck, happenstance, and especially the number of opportunities we’ve had in life. Your opportunities in life are absolutely dependent on your wealth. Those hoarding wealth are stealing opportunity from everyone.

    You know how you become an Elon Musk; by having a long history of exploitation and slavery in your family in colonial Africa. You know how you become a Bill Gates. Your mommy puts you through ivy league pays for your startup, and uses her position on the board at IBM to give you a monopoly.