>In the race to accelerate A.I., the Silicon Valley company Cerebras has landed on an unusual strategy: go big.
A very interesting and long-ish look into large wafer chips.
Some snippets.
>Instead of making chips in the usual way—by printing dozens of them onto a large wafer of silicon, cutting them out of the wafer, and then wiring them to one another—the company has made one giant “wafer-scale” chip. A typical computer chip is the size of a fingernail. Cerebras’s is the size of a dinner plate. It is the largest computer chip in the world.
~~
>In Cerebras’s printing system—developed in partnership with T.S.M.C., the company that manufactures its chips—the cookies overlap at their edges, so that their wiring lines up. The result is a single, “wafer-scale” chip, copper-colored and square, which is twenty-one centimetres on a side. (The largest G.P.U. is a little less than three centimetres across.) Cerebras produced its first chip, the Wafer-Scale Engine 1, in 2019. The WSE-2, introduced this year, uses denser circuitry, and contains 2.6 trillion transistors collected into eight hundred and fifty thousand processing units, or “cores.” (The top G.P.U.s have a few thousand cores, and most C.P.U.s have fewer than ten.)
>Well, that didn’t take long. Online researchers say they have found flaws in Apple’s new child abuse detection tool that could allow bad actors to target iOS users. However, Apple has denied these claims, arguing that it has intentionally built-in safeguards against such exploitation. > >It’s just the latest bump in the road for the rollout of the company’s new features, which have been roundly criticized by privacy and civil liberties advocates since they were initially announced two weeks ago. Many critics view the updates—which are built to scour iPhones and other iOS products for signs of child sexual abuse material (CSAM)—as a slippery slope towards broader surveillance. > >The most recent criticism centers around allegations that Apple’s “NeuralHash” technology—which scans for the bad images—can be exploited and tricked to potentially target users. This started because online researchers dug up and subsequently shared code for NeuralHash as a way to better understand it. One Github user, AsuharietYgvar, claims to have reverse-engineered the scanning tech’s algorithm and published the code to his page. Ygvar wrote in a Reddit post that the algorithm was basically available in iOS 14.3 as obfuscated code and that he had taken the code and rebuilt it in a Python script to assemble a clearer picture of how it worked. > >Problematically, within a couple of hours, another researcher said they were able to use the posted code to trick the system into misidentifying an image, creating what is called a “hash collision.” >...
Just to play devils advocate here, not to say your thoughts are not valid, how would this work?
During my day I typically use three devices, my phone, a desktop computer and a notebook. If there is no server involved and I am in communication with someone on my phone and then go to my desktop computer, how does the message history/conversation move?
Same for my notebook that only gets turned on in the evening?
What about messages that I might receive when all are off?
>CVE: CVE-2021-25218 >Document version: 2.0 >Posting date: 18 August 2021 >Program impacted: BIND >Versions affected: BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition >Severity: High >Exploitable: Remotely >Description: >If named attempts to respond over UDP with a response that is larger than the current effective interface maximum transmission unit (MTU), and if response-rate limiting (RRL) is active, an assertion failure is triggered (resulting in termination of the named server process). >...
>T-Mobile will offer two years of free identity theft protection services after hackers stole data on roughly 49 million customers and potential customers, according to a statement from the mobile carrier. The data breach only became public over the past weekend after hackers offered to sell the data for six bitcoin, or roughly $272,400 based on the current price. > >T-Mobile first confirmed data was stolen on Monday but the company didn’t share at that time what was stolen. The mobile carrier now says the compromised data of 48 million customers includes first and last names, dates of birth, social security numbers, and driver’s license information. An additional 850,000 T-Mobile prepaid customer names, phone numbers, and account PINs were also compromised. > >“While our investigation is still underway and we continue to learn additional details, we have now been able to confirm that the data stolen from our systems did include some personal information,” T-Mobile told Gizmodo in a statement over email. > >While T-Mobile says data on roughly 49 million people was taken, the hackers say it’s closer to 100 million. Thankfully, neither the hackers nor T-Mobile claim any credit card information has been compromised. >...