Off-and-on trying out an account over at @tal@oleo.cafe due to scraping bots bogging down lemmy.today to the point of near-unusability.

  • 1 Post
  • 32 Comments
Joined 2 years ago
cake
Cake day: October 4th, 2023

help-circle

  • That sign won’t stop me, because I can’t read!

    $ man ls | spd-say -e
    

    EDIT: If you run the above, it looks like speech-dispatcher splits the thing up into a bunch of different consecutive blocking requests, which means that it’s a pain in the neck to stop with a single command. You might want to leave $ while true; do spd-say -S; done running for a bit to make it actually stop talking.



  • looks dubious

    Altman and a few others, maybe. But this is a broad collection of people. Like, the computer science professors on the signatory list there aren’t running AI companies. And this isn’t saying that it’s imminent.

    EDIT: I’ll also add that while I am skeptical about a ban on development, which is what they are proposing, I do agree with the “superintelligence does represent a plausible existential threat to humanity” message. It doesn’t need OpenAI to be a year or two away from implementing it for that to be true.

    In my eyes, it would be better to accelerate work on AGI safety rather than try to slow down AGI development. I think that the Friendly AI problem is a hard one. It may not be solveable. But I am not convinced that it is definitely unsolvable. The simple fact is that today, we have a lot of unknowns. Worse, a lot of unknown unknowns, to steal a phrase from Rumsfeld. We don’t have a great consensus on what the technical problems to solve are, or what any fundamental limitations are. We do know that we can probably develop superintelligence, but we don’t know whether developing superintelligence will lead to a technological singularity, and there are some real arguments that it might not — and that’s one of the major, “very hard to control, spirals out of control” scenarios.

    And while AGI promises massive disruption and risk, it also has enormous potential. The harnessing of fire permitted humanity to destroy at almost unimaginable levels. Its use posed real dangers that killed many, many people. Just this year, some guy with a lighter wiped out $25 billion in property here in California. Yet it also empowered and enriched us to an incredible degree. If we had said “forget this fire stuff, it’s too dangerous”, I would not be able to be writing this comment today.


  • That’s one issue.

    Another is that even if you want to do so, it’s a staggeringly difficult enforcement problem.

    What they’re calling for is basically an arms control treaty.

    For those to work, you have to have monitoring and enforcement.

    We have had serious problems even with major arms control treaties in the past.

    https://en.wikipedia.org/wiki/Chemical_Weapons_Convention

    The Chemical Weapons Convention (CWC), officially the Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction, is an arms control treaty administered by the Organisation for the Prohibition of Chemical Weapons (OPCW), an intergovernmental organization based in The Hague, Netherlands. The treaty entered into force on 29 April 1997. It prohibits the use of chemical weapons, and the large-scale development, production, stockpiling, or transfer of chemical weapons or their precursors, except for very limited purposes (research, medical, pharmaceutical or protective). The main obligation of member states under the convention is to effect this prohibition, as well as the destruction of all current chemical weapons. All destruction activities must take place under OPCW verification.

    And then Russia started Novichoking people with the chemical weapons that they theoretically didn’t have.

    Or the Washington Naval Treaty:

    https://en.wikipedia.org/wiki/Washington_Naval_Treaty

    That had plenty of violations.

    And it’s very, very difficult to hide construction of warships, which can only be done by large specialized organizations in specific, geographically-constrained, highly-visible locations.

    But to develop superintelligence, probably all you need is some computer science researchers and some fairly ordinary computers. How can you monitor those, verify that parties involved are actually following the rules?

    You can maybe tamp down on the deployment in datacenters to some degree, especially specialized ones designed to handle high-power parallel compute. But the long pole here is the R&D time. Develop the software, and it’s just a matter of deploying it at scale, and that can be done very quickly, with little time to respond.






  • While that’s true, GOG also is intended to let you download an offline installer. If GOG dies, you still have the game, as long as you saved the installer. If GOG changes the terms of their service or software, they have little leverage.

    There are ways to archive Steam games, but it’s not the “normal mode of operation”. If Steam dies, you probably don’t have your games. If Steam’s terms of service or software changes, they have a lot of leverage to force new changes through.

    Some other wrinkles:

    • Some games on GOG today have DRM, though at least it’s clearly marked.

    • I also agree that Valve has and continues to do an enormous amount to support Linux gaming. I used Linux as my desktop back in the days when Valve wasn’t doing Linux, and the gaming situation on Linux was far more limited. It’s hard to overstate how radical an impact Valve’s support has had.


  • https://en.wikipedia.org/wiki/N%2B%2B

    N++ is a platform video game developed and published by Metanet Software. It is the third and final installment of the N franchise, which started with the Adobe Flash game N. It is the sequel to N+. The game was initially released for the PlayStation 4 on July 28, 2015, in North America, and July 29, 2015, in Europe, and was later released for the Microsoft Windows and macOS operating systems on August 25, 2016, and December 26, 2016, respectively. The Xbox One version was released on October 4, 2017.[1] The Linux version of the game was released on May 31, 2018.

    https://en.wikipedia.org/wiki/N%2B

    N+ is the console and handheld version of the Adobe Flash game N, which was developed by Metanet Software. N+ for Xbox Live Arcade was developed by Slick Entertainment and published by Metanet Software. Unique versions of the game were also ported separately to the PlayStation Portable[1] and Nintendo DS[2] by developers SilverBirch Studios and Atari.[3] Metanet Software licensed their N IP for this deal, provided single player level design for both versions, and consulted on the project.

    The Xbox Live Arcade version was released on February 20, 2008, and three expansion packs were released later that year on July 23, September 10, and October 15.[4] The handheld versions were released on August 26, 2008.[5][6] N+ was followed by N++ in 2015.

    https://en.wikipedia.org/wiki/N_(video_game)

    N (stylized as n) is a freeware video game developed by Metanet Software. It was inspired in part by Lode Runner, Soldat, and other side-scrolling games. It was the first of the N series, followed by N+ and N++. N won the audience choice award in the downloadables category of the 2005 Independent Games Festival.[1]

    Release: WW: March 1, 2004


  • I mean, I’m serious. Like, it’s a big CRM platform that people use and I understand has an ecosystem of software that integrates with it, is well-established.

    It’s like, someone may not like Photoshop. Frankly, I avoided it in favor of Gimp since the early 2000s, and I really don’t like the fact that it’s SaaS now.

    But you can’t just say “Photoshop sucks, artists use charcoal sticks now”. You have to have that alternative, like Gimp. And even then, people are going to have some loss in experience and loss in integrated software (like plugins and stuff) in a switch.

    I don’t do CRM. But my understanding is that it does matter and that that ecosystem matters, and “just throw one’s hands up in the air and tell people not to use a CRM platform” is probably not going to fly.

    kagis

    I thought that SugarCRM was open-source, but it looks like I’m a decade out-of-date — it started as an open-source project, but apparently the company founded around it took it proprietary. And I bet that it doesn’t compare in size in terms of people with experience with it or software that integrates with it.

    kagis

    https://www.salesforceben.com/salesforce-ecosystem/

    The Salesforce ecosystem is an absolute behemoth. Salesforce employs around 70,000 people and is the biggest employer in Silicon Valley. They also have a market cap of a quarter of a trillion – pretty impressive, right?

    However, when you look at the Salesforce ecosystem, there are 15M people involved in Salesforce’s community who work as end users, in consultancies, and for app companies. The Salesforce economy is also predicted to generate revenues of six times that of Salesforce by 2026.

    Like, you’re not gonna move that overnight.

    It could be that Salesforce sucks on a technical level as a platform. I don’t know, haven’t used it. But what I’m saying is that I suspect that for a lot of users, they aren’t in a great position to plop in an existing replacement overnight.

    EDIT: It sounds like there’s a continuing open-source fork of SugarCRM, SuiteCRM. This is the first I’ve heard of it, though, so I kinda suspect that the userbase isn’t massive.



  • I have, in the past, kind of wished that settings and characters could not be copyrighted. I realize that there’s work that goes into creating each, but I think that we could still live in a world where those weren’t protected and interesting stuff still gets created. If that were to happen, then I agree, it’d be necessary to make it very clear who created what, since the setting and characters alone wouldn’t uniquely identify the source.

    Like, there are things like Greek mythology or the Robin Hood collection of stories, very important works of art from our past, that were created by many different unaffiliated people. They just couldn’t be created today with our modern stories, because the settings and characters would be copyrighted and most rightsholders don’t just offer a blanket grant of rights to use them.

    That’s actually one unusual and notable thing H.P. Lovecraft did — if you’ve ever seen stuff in the Cthulhu Mythos, that’s him. He encouraged anyone who wanted to do so to create stuff using his universe. One reason why we have that kind of collection of Lovecraftian stuff.

    But you can’t do that with, say, Star Wars or a lot of other beloved settings.



  • There is a class of products that consist of a hardware box that you ram your network traffic moving between different business locations in a company through that tries to accelerate this traffic. F5 is one manufacturer of them. One technique these use is to have private key material such that they can pretend to be the server at the other end of a TLS connection — that’s most of the “encrypted” traffic that you see on the Internet. If you go to an “https” URL in your Web browser, you’re talking TLS, using an encrypted connection. They can then decode the traffic and use various caching and other modification techniques on the decoded information to reduce the amount of traffic moving across the link and to reduce effective latency, avoid transferring duplicate information, etc. Once upon a time, when there was a lot less encrypted traffic in the world, you could just do this by working on cleartext data, but over time, network traffic have increasingly become encrypted. Many such techniques become impossible with encrypted traffic. So they have to be able to break the encryption on the traffic, to get at the cleartext material.

    The problem is that to let this box impersonate such a server so that it can get at the unencrypted traffic, they have to have a private key that permits them to impersonate the real server. Having access to this key is also interesting to an attacker, because it would similarly let them impersonate the real server, which would let them view or modify network traffic in transit. If one could push new, malicious software up to control these boxes, one could steal these keys, which would be of interest to attackers in attacking other systems.

    It sounds, to my brief skim, like attackers got control of the portion of F5’s internal network that is involved with building and distributing software updates to these boxes.

    The problem is that if you’re a sysadmin at, say, General Dynamics (an American defense contractor which, from a quick search, apparently uses these products from F5), you may have properly secured your servers internal to the company in all ways…but then the network admin basically let another box, which wasn’t properly secured, into the encrypted communications between your inter-office servers on the network. It could extract information from your encrypted communication streams, or modify it. God only knows what important data you’ve been shoveling across those connections, or what you’ve done with information that you trusted to remain unmodified while crossing such a connection. It’s be a useful tool for an attacker to stick all sorts of new holes into customer networks that are harder to root out.


  • It definitely is bad, but it may not be as bad as I thought above.

    It sounds like they might actually just be relying on certificates pre-issued by a (secured) CA for specific hosts to MITM Web traffic to specific hosts, and they might not be able to MITM all TLS traffic, across-the-board (i.e. their appliance doesn’t get access to the internal CA’s private key). Not sure whether that’s the case — that’s just from a brief skim — and I’m not gonna come up to speed on their whole system for this comment, but if that’s the case, then you’d still be able to attack probably a lot of traffic going to theoretically-secured internal servers if you manage to get into a customer network and able to see traffic (which compromising the F5 software updates would also potentially permit for, unfortunately) but hopefully you wouldn’t be able to hit, say, their VPN traffic.


  • F5 said a “sophisticated” threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a “long-term.” Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network for years.

    This could be really bad. F5 produces WAN accelerators, and one feature that those can have is to have X.509 self-signed certificates used by corporate internal CAs stored on them — things that normally, you’d keep pretty damned secure — to basically “legitimately” perform MITM attacks on traffic internal to corporate networks as part of their normal mode of operation.

    Like, if an attacker could compromise F5 Networks and get a malicious software update pushed out to WAN accelerators in the field to exfiltrate critical private keys from companies, that could be bad. You could probably potentially MITM their corporate VPNs. If you get inside a customer’s network, it’d probably let you get by a lot of their internal security.

    kagis

    Yeah, it sounds like that is exactly what they hit. The “BIG-IP” stuff apparently does this:

    During that time, F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world’s top 50 corporations

    https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/ltm-implementations-11-5-1/10.html

    MyF5 Home > Knowledge Centers > BIG-IP LTM > BIG-IP Local Traffic Manager: Implementations > Managing Client and Server HTTPS Traffic using a Self-signed Certificate

    One of the ways to configure the BIG-IP system to manage SSL traffic is to enable both client-side and server-side SSL termination:

    • Client-side SSL termination makes it possible for the system to decrypt client requests before sending them on to a server, and encrypt server responses before sending them back to the client. This ensures that client-side HTTPS traffic is encrypted. In this case, you need to install only one SSL key/certificate pair on the BIG-IP system.
    • Server-side SSL termination makes it possible for the system to decrypt and then re-encrypt client requests before sending them on to a server. Server-side SSL termination also decrypts server responses and then re-encrypts them before sending them back to the client. This ensures security for both client- and server-side HTTPS traffic. In this case, you need to install two SSL key/certificate pairs on the BIG-IP system. The system uses the first certificate/key pair to authenticate the client, and uses the second pair to request authentication from the server.

    This implementation uses a self-signed certificate to authenticate HTTPS traffic.

    Well. That…definitely sucks.


  • For example, its not only illegal for someone to make and sell known illegal drugs, but its additionally illegal to make or sell anything that is not the specifically illegal drug but is analogous to it in terms of effect (and especially facets of chemical structure)

    Hmm. I’m not familiar with that as a legal doctrine.

    kagis

    At least in the US — and this may not be the case everywhere — it sounds like there’s a law that produces this, rather than a doctrine. So I don’t think that there’s a general legal doctrine that would automatically apply here.

    https://en.wikipedia.org/wiki/Federal_Analogue_Act

    The Federal Analogue Act, 21 U.S.C. § 813, is a section of the United States Controlled Substances Act passed in 1986 which allows any chemical “substantially similar” to a controlled substance listed in Schedule I or II to be treated as if it were listed in Schedule I, but only if intended for human consumption. These similar substances are often called designer drugs. The law’s broad reach has been used to successfully prosecute possession of chemicals openly sold as dietary supplements and naturally contained in foods (e.g., the possession of phenethylamine, a compound found in chocolate, has been successfully prosecuted based on its “substantial similarity” to the controlled substance methamphetamine).[1] The law’s constitutionality has been questioned by now Supreme Court Justice Neil Gorsuch[2] on the basis of Vagueness doctrine.

    But I guess that it might be possible to pass a similar such law for copyright, though.