• 0 Posts
  • 19 Comments
Joined 1 year ago
cake
Cake day: June 2nd, 2023

help-circle



  • It’s never claimed to be a democracy. It’s not a monolith, either. Some projects have forms of input and/or voting, most don’t because it’s just a few people writing software that they want to write.

    Get over yourself if you think that people working for free should be required to listen to you. Just as in anything else, pay them if you want a guaranteed response.

    Otherwise, recognize that the key element of Open Source is that you have the source code. If a project isn’t doing what you want then fork it and build it yourself. That’s the whole point of this community and philosophy.






  • VPNs are not the security panacea that marketers would have you think they are. Using a VPN does provide some obfuscation as to your origin, but it does change your trust model. The VPN service provider may tunnel your traffic through your ISP to hide data from the ISP, but now it’s visible to the VPN service provider instead.

    There are plenty of use cases for a VPN, but just like any other technology or service, you need to know what it actually does so you know what it actually achieves or doesn’t achieve.



  • I’ve been doing a lot of using, testing, and evaluating LLMs and GPT-style models for generating code and text/prose. Some of it is just general use to see how it behaves, some has been explicit evaluation of creative writing, and a bunch of it is code generation to test out how we need to modify our CS curriculum in light of these new tools.

    It’s an impressive piece of technology, but it’s not very creative. It’s meh. The results are meh. Which is to be expected since it’s a statistical model that’s using a large body of prior work to produce a reasonable approximation of what it’s seen before. It trends towards the mean, not the best.




  • We had an ongoing project studying network communication structures within social media groups. The primary goal was to identify patterns of misinformation dissemination. We lost our ability to poll the API and pull messages to build up our data sets to work with. The cost to hit the API used to be free for a limited rate for researchers, but the new doofus in charge demanded a massive rate to get even a reasonable quantity of data so we had to fold up shop. We just routed the students to other projects, but it’s one more way to isolate and control the network so the dictator can be in charge however they like.






  • This one’s not really new. It’s essentially the basis of the entire FSF manifesto and the purpose behind the GPL in the first place. If you don’t have the source code to your tech, you have no real idea what’s happening to your information while you use it.

    Adding a TOR layer on top of a black box OS might provide some privacy for your network traffic, but the system calls being called by the browser are inherently untrustworthy to begin with.

    Or, to sum up “Proprietary untrustworthy, open source more trustworthy,” which still isn’t as pithy as your quip.