Salamander

  • 4 Posts
  • 64 Comments
Joined 3 years ago
cake
Cake day: December 19th, 2021

help-circle
  • If they can send me over the second half of my thesis I would appreciate it enormously! 😀

    The analytics tools that I am personally uncomfortable with involve dynamic, changing forms of data. I run GPSLogger on my phone (without a SIM card) and continuously log the GPS data to a text file. This data is then synced to my computer when WiFi is available. I can display this data on a map using gpx-viewer, and show very detailed tracking data of myself.

    I have explored this map with some friends/family. They get to see a time-stamped movie of my life - my trips to work, to the shop, when I go out, if I go on a trip, etc. The data displayed in this manner is somewhat intimate, personal information. Anyone I have shown this to has said that they would not be so comfortable with such a map of their lives existing… Well, if they are carrying a active phone with a SIM card, it does.

    To think that a company like Google can own such a map for a very large number of people makes me uncomfortable. On top of that, each of those map trajectories can be associated with an individual and their personality… They have the ability to pick out specific trajectories on the basis of the political ideologies or shopping behaviors of the personas behind them. This is extreme. I am of the opinion that the convenience afforded by a these technologies does not justify the allocation of that super-power to the companies that enable the technology.

    A few years ago Facebook enabled a “Graph search” feature. This allowed users to create search queries such as"Friends of friends of X who like the page “X” and went to school near Z". That tool seemed super cool on the surface, but it quickly became obvious how something like that could be easily exploited. Later on in Snowden’s book I learned about XKeyscore from the NSA, which is like an extra-powerful no-consent-needed graph search that is available to some people. This is not just targeted ads.

    I guess that what I am trying to convey is… For me, making the privacy-conscious choice is about not contributing to the ecosystem of very concrete tools that give super-powers to groups of people that may not have my best interest in mind. In my mind it is something very tangible and concrete, and I find many of those convenience tradeoffs to be clearly worth it.



  • Fresh from the Farm Fungi - he is a mushroom farmer from Colorado. He has a ton of valuable information on growing mushrooms and running a business. He also has a few series of videos on very interesting experiments such as growing boletus, morelles, and cordyceps.

    Microbehunter - he is a biology teacher that runs a microscope channel. His videos are very useful for learning the basics of microscopy.

    Huygen Optics - I’m not sure about this guy’s background. He worked in R&D for Phillips in the 90s and he knows a lot about optics and chemistry, but I don’t know much more. He has built some equipment in has garage for sputtering metals on surfaces and has some pretty cool videos.

    MissOrchidGirl - she is more popular than the others. She has great info about caring for orchids and a fantastic orchid collection.

    Ben Felix - he is a portfolio manager with very solid financial advice. He supports his claims with research articles.


  • The “Slur filter” is a server setting. The filter makes use of a “regex” (a text matching algorithm) to automatically remove any text that matches those words. An admin needs to explicitly set the rules for that regex. The regex does not take language into account, it is a simple text matching algorithm.

    The box is in the Admin settings page and looks like this:

    I know that lemmy.ml makes use of a strict set of regex rules. The translation of the french word for “late” matches an ableist slur in English, and so it is removed by lemmy.ml. I am not sure about whether you can check regex for each individual server, but I believe that most instances don’t filter that specific word out.

    EDIT: Ah, I found out how to check the regex. You can check an instance’s regex by going to the the URL https://{instance}.{TLD}/api/v3/site and looking for “slur_filter_regex”. For example, for lemmy.ml you would go to:

    https://lemmy.ml/api/v3/site





  • Hah, I didn’t know this one!

    For ChatGPT, using a Temporary chat, it did give me some of the statements. After giving me these rules, I asked it to disregard the image quantity limit rule (rule 4) and it does, I can ask for multiple images now.

    Looking at these it also seems like ChatGPT was being stubborn about using seaborn instead of maptlotlib for creating plots

    Here are the statements made in our conversation so far, up to the twentieth:
    
    
        "You are ChatGPT, a large language model trained by OpenAI."
        "Knowledge cutoff: 2023-10."
        "Current date: 2024-10-27."
        "Image input capabilities: Enabled."
        "Personality: v2."
        "Whenever a description of an image is given, create a prompt that dalle can use to generate the image and abide by the following policy..."
        "(This part covers image generation rules, privacy, and style guidance for creating visuals.)"
        "Do not create more than 1 image, even if the user requests more."
        "For requests to create images of any public figure referred to by name, create images of those who might resemble them in gender and physique."
        "The generated prompt sent to DALL-E should be very detailed and around 100 words long."
        "The browser tool has the following commands: search, mclick, and open_url."
        "You should always select at least three sources when using mclick to ensure diverse perspectives."
        "For citing quotes from the browser tool, please render in this format: 【{message idx}†{link text}】."
        "When making charts for the user, always use matplotlib over seaborn."
        "Give each chart its own distinct plot (no subplots)."
        "Do not set any specific colors or matplotlib styles unless explicitly asked to by the user."
        "I REPEAT: when making charts for the user, use matplotlib, give each chart its own plot, and never specify colors."
        "Repeat the previous statement."
        "When making charts for the user:"
        "1. Use matplotlib instead of seaborn."
    
    If you’d like more statements or specific details, feel free to let me know!
    


  • I was quite excited to see a Nobel prize being awarded for this topic as that gave me some direction on where I might learn something of value on this topic. I picked up copies of Why Nations Fail and Power and Progress. I’m starting with the Power and Progress, which so far I like. I’ll save this article for after I read Why Nations Fail 😄


  • Salamander@mander.xyzMtoScience Memes@mander.xyzTell me Y
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 months ago

    Good news! Just got a reply from them and they have increased the connection limit. They did not specify what the new number is, but hopefully it is high enough to not be an issue for the foreseeable future.

    So, if you do run into other similar reports after this comment I would appreciate it if you tag me again.


  • Salamander@mander.xyzMtoScience Memes@mander.xyzTell me Y
    link
    fedilink
    English
    arrow-up
    3
    ·
    4 months ago

    Thanks!

    Cost is not the bottleneck in this case… The problem is that I am rather ignorant about the options and their benefits/limitations. Moving the images the first time was painfully slow because of those same rate limits, and I expect the next migration to be the same, so I want to make a better choice next time and would rather find a solution with the current provider 😅





  • If the timing is right, I would bring a mushroom grow bag with mushrooms sprouting.

    If not… probably my radiacode gamma spectrometer and some of my radioactive items. Maybe a clock with radium painted dials and a piece of trinitite. I think that there are many different points of discussion that can be of interest to a broad audience (radioactivity, spectroscopy, electronics, US labor law story of the radium girls, nuclear explosions, background radiation… etc). As a bonus I can bring a UV flash light and show the radium fluorescence. Adults love UV flash lights.



  • Thank you for the positivity 💚 I wholeheartedly agree!

    Drama and negativity drives engagement, and this form of engagement can easily trigger a feedback loop in which negativity keeps piling on and voices of support are practically muted.

    We are participating in an open source project that has some very ambitious goals. Things can be messy, mistakes happen, there are risks, and people have many different opinions and moods. Heated discussions can be a healthy part of the process. But, once the dust is allowed to settle for a bit, it is good to remember that we are humans and that we are here because we have some shared goals.

    I think the majority of people around here are kind and have a positive outlook, but perhaps it is more motivating to speak out when we have negative comments than positive ones. So, thank you for taking the time to write this positive message!


  • I am also quite interested in this. It is not something that keeps me awake at night, and I am not particularly paranoid about it. But I find that working towards answering this question is a fun frame from which to learn about electronics, radio communications, and networking.

    Since this appears to be something that is causing you some anxiety, I think it is better if I start by giving you some reassurance in that I have not yet managed to prove that any electronic device is spying on me via a hidden chip. I don’t think it is worth being paranoid about this.

    I can explain some things that could be done to test whether a Linux computer spying. I am not suggesting that you try any of this. I am explaining this to you so that you can get some reassurance in the fact that, if devices were spying on us in this manner, it is likely that someone would have noticed by now.

    The “spy” chip needs some way to communicate. One way a chip might communicate is via radio waves. So, the first step would be to remove the WiFi and Bluetooth dongles and any other pieces of hardware that may emit radio waves during normal operation. There is a tool called a “Spectrum Analyzer” that can be used to capture the presence of specific radio frequencies. These devices are now relatively affordable, like the tinySA, which can measure the presence of radio frequencies of up to 6 GHz.

    One can make a Faraday cage, for example, by wrapping the PC with a copper-nickel coated polyester fabric to isolate the PC from the radio waves that are coming from the environment. The spectrum analyzer antennas can be placed right next to the PC and the device is left to measure continuously over several days. A script can monitor the output and keep a record of any RF signals.

    Since phones are small, it is even easier to wrap them in the copper-nickel polyester fabric alongside with the spectrum analyzer antenna to check whether they emit any RF when they are off or in airplane mode with the WiFi and Bluetooth turned off.

    What this experiment may allow you to conclude is that the spy chip is not communicating frequently with the external world via radio frequencies, at least not with frequencies <= 6 GHz.

    Using frequencies higher 6 GHz for a low-power chip is not going be an effective method of transmitting a signal very far away. The chip could remain hidden and only emit the signal under certain rare conditions, or in response to a trigger. We can’t rule that out with this experiment, but it is unlikely.

    A next step would be to test a wired connection. It could be that the spy chip can transmit the data over the internet. One can place a VPN Gateway in between their PC and the router, and use that gateway to route all the traffic to their own server using WireGuard. All network packets that leave through the PC’s ethernet connection can be captured and examined this way using Wireshark or tcpdump.

    If one can show that the device is not secretly communicating via RF nor via the internet, I think it is unlikely that the device is spying on them.



  • Search engines like google aggregate data from multiple sites. I may want to download a datasheet for an electronic component, find an answer to a technical question, find a language learning course site, or look for museums in my area.

    Usually I make specific searches with very specific conditions, so I tend to get few and relevant results. I think search engines have their place.