Hacker Newsnew | past | comments | ask | show | jobs | submit | lmz's commentslogin

Surely that's "on" FreeBSD not "by" FreeBSD?

It’s funded by the FreeBSD foundation, so “by” fits.

But it's got a separate entity providing paid support?

Micron is killing its Crucial consumer brand, not supplies to consumer brands who use its chips. Hynix never had a consumer brand for RAM I don't think?

That's just an example. It does have defaults: https://docs.oracle.com/en/java/javase/11/docs/api/java.net.... (search for "If this method is not invoked")

> This means that even though Red Hat, at this stage in it's development, has a majority of contribution, the project itself can never be taken over by a single entity.

If it's one company with the majority of contributions then they can just stop contributing (or put their efforts into a proprietary fork) and all that you're left with is the code and the name. Which is maybe better than "just the code", but not by much.


There are over 600 different people contributing to OpenStack in a given six-month release cycle. Approximately 60% of total code by commit count is from Red Hat employees. I'm one of the 600 that don't work at Red Hat, and there are a lot of us.

You should get a sense of the scale of a project before summarily declaring that it has a single point of failure.


You just said majority without any numbers in the original post. I think you'll agree that the calculus would be quite different for 60% vs 85% of effort being from a single company.

If the goal is to stay away from US or European influence then the Russians would be a better bet.

Yes but that has the same downsides as China.

And that's pretty much the thread. You're either subject to a large power's jurisdiction or subject to a jurisdiction whose sovereignty is at the pleasure of large powers... Pick a threat model, plan appropriately, and keep things in perspective.

Most likely to be a router, configured to fail over.

Also any app-specific bindings would I guess require some hooking (input interception / injection) at the software level.


Now there's an interesting challenge. A ROM that does a VM breakout and runs a command on the host.


It's been done, the ZSNES and Project64 emulators have both had exploits which allowed a malicious ROM to run arbitrary code on the host. ZSNES is written mostly in assembly so that was kinda asking for trouble though.


> Model rewrites remove much of specific human dimension

Great. Isn't that part of being anonymous if one so desires? This would have decent potential to avoid stylometry deanonymization, no?


Great? If you're worried that somebody's actively trying to identify your HN comments against some other source of your writing perhaps. But using a LLM to "avoid deanonymization" is about as sensible for some everyday Joe, as wearing a tinfoil hat in public to avoid 5G radiation is.


Yeah it's great if that's what you want to do. Whether it makes sense for any rando to do that is another question.


Whether it makes sense for anybody to do it is the real question. The threat model where this is a useful thing to do doesn't really exist in my opinion, at least not for obfuscating random comments. Perhaps if you're doing some anonymous journalism that's uncomfortable for your country's regime, and you've previously written other stuff using your real name, it might make sense to run your writing through a LLM, maybe. In addition to a bunch of other Snowden-esque countermeasures.


Don't you think that as LLMs get better the deanonimization attacks will get easier?

Also, a journalist in a hostile regime might be one example, but a user that posted _very_ personal things under an alt account is also another example, and I bet the latter is much more common than the former.


Do you have enemies that would be interested in spending real money trying to link your public accounts to some (possibly existing, likely not) alt accounts with "personal things"? I don't think that's very common.

And no, while I'm sure LLMs can be used for stylometry in academic exercises, I don't think they'll really enable any sort of automatic mass-deanonymization of random social media accounts. But who knows, the US government probably has a bunch of new PRISM-like programs going on already, so it might happen.


Maybe we'd see "coding gyms" like how white collar workers have gyms for the physical exercise they're not getting from their work.


codeforces and topcoder have existed for years


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: