Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Notices by GeniusMusing (geniusmusing@nu.federati.net), page 54

  1. GeniusMusing (geniusmusing@nu.federati.net)'s status on Friday, 20-Aug-2021 14:58:33 EDT GeniusMusing GeniusMusing
    The World’s Largest Computer Chip The New Yorker
    https://www.newyorker.com/tech/annals-of-technology/the-worlds-largest-computer-chip

    >In the race to accelerate A.I., the Silicon Valley company Cerebras has landed on an unusual strategy: go big.

    A very interesting and long-ish look into large wafer chips.

    Some snippets.

    >Instead of making chips in the usual way—by printing dozens of them onto a large wafer of silicon, cutting them out of the wafer, and then wiring them to one another—the company has made one giant “wafer-scale” chip. A typical computer chip is the size of a fingernail. Cerebras’s is the size of a dinner plate. It is the largest computer chip in the world.

    ~~

    >In Cerebras’s printing system—developed in partnership with T.S.M.C., the company that manufactures its chips—the cookies overlap at their edges, so that their wiring lines up. The result is a single, “wafer-scale” chip, copper-colored and square, which is twenty-one centimetres on a side. (The largest G.P.U. is a little less than three centimetres across.) Cerebras produced its first chip, the Wafer-Scale Engine 1, in 2019. The WSE-2, introduced this year, uses denser circuitry, and contains 2.6 trillion transistors collected into eight hundred and fifty thousand processing units, or “cores.” (The top G.P.U.s have a few thousand cores, and most C.P.U.s have fewer than ten.)
    In conversation Friday, 20-Aug-2021 14:58:33 EDT from nu.federati.net permalink

    Attachments

    1. Invalid filename.
      The World’s Largest Computer Chip
      from The New Yorker
      In the race to accelerate A.I., the Silicon Valley company Cerebras has landed on an unusual strategy: go big.
  2. GeniusMusing (geniusmusing@nu.federati.net)'s status on Friday, 20-Aug-2021 10:22:57 EDT GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    Gotta love translations.
    In conversation Friday, 20-Aug-2021 10:22:57 EDT from nu.federati.net permalink
  3. GeniusMusing (geniusmusing@nu.federati.net)'s status on Thursday, 19-Aug-2021 19:11:55 EDT GeniusMusing GeniusMusing
    in reply to
    • Alexandre Oliva (moved to @lxo@gnusocial.jp)
    @lxo Yes please.
    In conversation Thursday, 19-Aug-2021 19:11:55 EDT from nu.federati.net permalink
  4. GeniusMusing (geniusmusing@nu.federati.net)'s status on Thursday, 19-Aug-2021 16:50:22 EDT GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    @lnxw48a1
    #TIL
    DHT != Dihydrotestosterone
    DHT == Distributed hash table
    In conversation Thursday, 19-Aug-2021 16:50:22 EDT from nu.federati.net permalink
  5. GeniusMusing (geniusmusing@nu.federati.net)'s status on Thursday, 19-Aug-2021 16:47:15 EDT GeniusMusing GeniusMusing
    in reply to
    • Alexandre Oliva (moved to @lxo@gnusocial.jp)
    From the "But wait! There's more fail" department.

    Apple's Not Digging Itself Out of This One
    https://gizmodo.com/apples-not-digging-itself-out-of-this-one-1847509340

    >Well, that didn’t take long. Online researchers say they have found flaws in Apple’s new child abuse detection tool that could allow bad actors to target iOS users. However, Apple has denied these claims, arguing that it has intentionally built-in safeguards against such exploitation.
    >
    >It’s just the latest bump in the road for the rollout of the company’s new features, which have been roundly criticized by privacy and civil liberties advocates since they were initially announced two weeks ago. Many critics view the updates—which are built to scour iPhones and other iOS products for signs of child sexual abuse material (CSAM)—as a slippery slope towards broader surveillance.
    >
    >The most recent criticism centers around allegations that Apple’s “NeuralHash” technology—which scans for the bad images—can be exploited and tricked to potentially target users. This started because online researchers dug up and subsequently shared code for NeuralHash as a way to better understand it. One Github user, AsuharietYgvar, claims to have reverse-engineered the scanning tech’s algorithm and published the code to his page. Ygvar wrote in a Reddit post that the algorithm was basically available in iOS 14.3 as obfuscated code and that he had taken the code and rebuilt it in a Python script to assemble a clearer picture of how it worked.
    >
    >Problematically, within a couple of hours, another researcher said they were able to use the posted code to trick the system into misidentifying an image, creating what is called a “hash collision.”
    >...
    In conversation Thursday, 19-Aug-2021 16:47:15 EDT from nu.federati.net permalink

    Attachments

    1. Invalid filename.
      Apple's Not Digging Itself Out of This One
      from Gizmodo
      The ongoing drama surrounding the company's proposed new child abuse prevention tools has taken another turn.
  6. GeniusMusing (geniusmusing@nu.federati.net)'s status on Thursday, 19-Aug-2021 16:11:26 EDT GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    • Alexandre Oliva (moved to @lxo@gnusocial.jp)
    @lnxw48a1 @lxo

    Just to play devils advocate here, not to say your thoughts are not valid, how would this work?

    During my day I typically use three devices, my phone, a desktop computer and a notebook. If there is no server involved and I am in communication with someone on my phone and then go to my desktop computer, how does the message history/conversation move?

    Same for my notebook that only gets turned on in the evening?

    What about messages that I might receive when all are off?
    In conversation Thursday, 19-Aug-2021 16:11:26 EDT from nu.federati.net permalink
  7. GeniusMusing (geniusmusing@nu.federati.net)'s status on Thursday, 19-Aug-2021 13:49:56 EDT GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    I'm quite sure that at some point it will be recommended that blockchain should be used...

    for "security"...

    :P

    Too late, they already have...

    DNS seeds Blockchain Developer's Guide Book
    https://nu.federati.net/url/282509
    In conversation Thursday, 19-Aug-2021 13:49:56 EDT from nu.federati.net permalink

    Attachments

    1. Invalid filename.
      Blockchain Developer's Guide
      from O’Reilly Online Learning
      DNS seeds DNS seeds are servers which contains lists of IP addresses. These seeds are custom implementations of Berkeley Internet Name Daemon (BIND) and return random subsets collected … - Selection from Blockchain Developer's Guide [Book]
  8. GeniusMusing (geniusmusing@nu.federati.net)'s status on Thursday, 19-Aug-2021 12:14:13 EDT GeniusMusing GeniusMusing
    CVE-2021-25218: A too-strict assertion check could be triggered when responses in BIND 9.16.19 and 9.17.16 require UDP fragmentation if RRL is in use Security Advisories
    https://kb.isc.org/v1/docs/cve-2021-25218

    >CVE: CVE-2021-25218
    >Document version: 2.0
    >Posting date: 18 August 2021
    >Program impacted: BIND
    >Versions affected: BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition
    >Severity: High
    >Exploitable: Remotely
    >Description:
    >If named attempts to respond over UDP with a response that is larger than the current effective interface maximum transmission unit (MTU), and if response-rate limiting (RRL) is active, an assertion failure is triggered (resulting in termination of the named server process).
    >...
    In conversation Thursday, 19-Aug-2021 12:14:13 EDT from nu.federati.net permalink
  9. GeniusMusing (geniusmusing@nu.federati.net)'s status on Wednesday, 18-Aug-2021 16:52:49 EDT GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    I have found it a useful news feed (sports related) and has some amusing things in it but over all, meh.

    Every now and then I try to help some people in diybattery but some of them can't be helped away from macgyvering a final solution.
    In conversation Wednesday, 18-Aug-2021 16:52:49 EDT from nu.federati.net permalink
  10. GeniusMusing (geniusmusing@nu.federati.net)'s status on Wednesday, 18-Aug-2021 11:46:39 EDT GeniusMusing GeniusMusing
    in reply to
    • lnxw48a1
    It has aged as nicely as a year old forgotten gym bag of dirty, sweaty clothes.
    In conversation Wednesday, 18-Aug-2021 11:46:39 EDT from nu.federati.net permalink
  11. GeniusMusing (geniusmusing@nu.federati.net)'s status on Wednesday, 18-Aug-2021 08:19:10 EDT GeniusMusing GeniusMusing
    in reply to
    • GeniusMusing
    T-Mobile Offers Free Identity Theft Service After Massive Hack
    https://gizmodo.com/t-mobile-offers-free-identity-theft-protection-after-ha-1847507318

    >T-Mobile will offer two years of free identity theft protection services after hackers stole data on roughly 49 million customers and potential customers, according to a statement from the mobile carrier. The data breach only became public over the past weekend after hackers offered to sell the data for six bitcoin, or roughly $272,400 based on the current price.
    >
    >T-Mobile first confirmed data was stolen on Monday but the company didn’t share at that time what was stolen. The mobile carrier now says the compromised data of 48 million customers includes first and last names, dates of birth, social security numbers, and driver’s license information. An additional 850,000 T-Mobile prepaid customer names, phone numbers, and account PINs were also compromised.
    >
    >“While our investigation is still underway and we continue to learn additional details, we have now been able to confirm that the data stolen from our systems did include some personal information,” T-Mobile told Gizmodo in a statement over email.
    >
    >While T-Mobile says data on roughly 49 million people was taken, the hackers say it’s closer to 100 million. Thankfully, neither the hackers nor T-Mobile claim any credit card information has been compromised.
    >...
    In conversation Wednesday, 18-Aug-2021 08:19:10 EDT from nu.federati.net permalink

    Attachments

    1. Invalid filename.
      T-Mobile Offers Free Identity Theft Protection After Hackers Steal Data on Millions of Customers
      from Gizmodo
      Data on at least 49 million T-Mobile customers was compromised.
  • After
  • Before
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.