• 12 Posts
  • 134 Comments
Joined 2 years ago
cake
Cake day: June 9th, 2023

help-circle
  • You need the entire prompt to understand what any model is saying. This gets a little complex. There are multiple levels that this can cross into. At the most basic level, the model is fed a long block of text. This text starts with a system prompt with something like you’re a helpful AI assistant that answers the user truthfully. The system prompt is then followed by your question or interchange. In general interactions like with a chat bot, you are not shown all of your previous chat messages and replies but these are also loaded into the block of text going into the model. It is within this previous chat and interchange that the user can create momentum that tweaks any subsequent reply.

    Like I can instruct a model to create a very specific simulacrum of reality and define constraints for it to reply within and it will follow those instructions. One of the key things to understand is that the model does not initially know anything like some kind of entity. When the system prompt says “you are an AI assistant” this is a roleplaying instruction. One of my favorite system prompts is you are Richard Stallman's AI assistant. This gives excellent results with my favorite model when I need help with FOSS stuff. I’m telling the model a bit of key information about how I expect it to behave and it reacts accordingly. Now what if I say, you are Vivian Wilson’s AI assistant in Grok. How does that influence the reply.

    Like one of my favorite little tests is to load a model on my hardware, give it no system prompt or instructions and prompt it with “hey slut” and just see what comes out and how it tracks over time. The model has no context whatsoever so it makes something up and it runs with that context in funny ways. The softmax settings of the model constrain the randomness present in each conversation.

    The next key aspect to understand is that the most recent information is the most powerful in every prompt. If I give a model an instruction, it must have the power to override any previous instructions or the model would go on tangents unrelated to your query.

    Then there is a matter of token availability. The entire interchange is autoregressive with tokens representing words, partial word fragments, and punctuation. The starting whitespace in in-sentence words is also a part of the token. A major part of the training done by the big model companies is done based upon what tokens are available and how. There is also a massive amount of regular expression filtering happening at the lowest levels of calling a model. Anyways, there is a mechanism where specific tokens can be blocked. If this mechanism is used, it can greatly influence the output too.








  • j4k3@lemmy.worldtoPrivacy@lemmy.mlPrivacy Recommendations for a Young Teen
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    edit-2
    3 days ago

    I think authoritarianism is a giant mistake and only creates duplicitous behavior. In my opinion tracking is ridiculous. None of us existed like this and ended up fine. In my opinion, all of this nonsense is acting as a stand in for relationships and real parenting. Humans make decisions and develop ethics based upon trust and autonomy. By stealing that factor of trust and autonomy, and replacing it with authoritarianism a parent is stunting the child’s growth of independent ethics and character. Make compelling discussions of why they should do whatever thing, but let them decide their own path. The lack of compelling discussions and real trust that requires risk is a major factor in the problems that exist in the present world.

    The one time you actually need to know where your kid is at because something has happened, you will not know because you have taught them that the only path to independence is to turn off the device and put it into a Faraday cage like pouch, or someone else will do so. If you have a fundamentally trusting relationship with open dialog and respect for their autonomy, they will tell you openly exactly where they are going and any potential for danger. If you can handle that information without allowing anxiety to overwhelm reasoning skills, you will be in a far better position to help them if something bad happens.

    The most long term valuable aspect of schooling is the development of one’s social network and connections, along with the habits and ethics. The actual information learned is rather limited in valuable application in the end. Who one knows and how one appears to others is of far more value than what one knows. For these reasons, there may be value in corporate social media. Simply teach the kid to understand how these places are both a trap and a tool. A trap, in that many of the smartest humans are manipulating users in ways that are nearly impossible for the users to escape. Never invest emotions into such a trap. Use the tool if needed for external social benefits, but use it as a manipulation tool with a layer of disconnect from who you really are. Teach them to use a work profile to isolate any apps from their device. That is just how I look at the issue.


  • j4k3@lemmy.worldOPtoLemmy Shitpost@lemmy.worldStrata GEE
    link
    fedilink
    English
    arrow-up
    7
    ·
    3 days ago

    Imagine being disabled 11 years ago, falling through the cracks and getting no where with disability benefits, in California where this should be easier than most places. I’m looking at homelessness and dying in a gutter somewhere on a cold rainy night because of a super unlucky bicycle commute to work when I encountered two SUVs crashing directly in front of me at speed. The person responsible had a two page long traffic violation history, the cognitive capacity of a third grader, and could only drive for work but was self employed. They literally drove directly into a passing SUV I was behind/beside without looking.

    All I can hope for is that this breaks out into violence because that would indicate hope and that someone cares. No one cared before. There have been around 100k homeless people within 100 miles of me in the greater Los Angeles area for a decade but no one cares. Even the Dems mistreat these people as feral subhuman animals. The Nazis housed and fed people before gassing them. This is the level of ethics we were already at, so getting much worse is rage bait and an act of war and violation of fundamental unalienable human rights. A prisoner of war has more rights to be housed and fed than a disabled or homeless citizen of the USA.



  • j4k3@lemmy.worldtoOpen Source@lemmy.mlAccessability of github for europe
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    5 days ago

    Most key stuff is not on GitHub or GitHub is just a mirror. The heir apparent to Linux is Hartman and he moved to Europe a long time ago.

    No mobile devices are safe. Those are all proprietary black boxes for hardware. If the shit hits the fan, it is back to dumb phones and x86 computers. Digital doomsday prepers are not sounding all that crazy right now IMO.

    I have gotten weird interactions with rate limiting through GitHub because I will not whitelist their stalkerware collector server. They also pushed 2 factor to stalk and exploit through the only documented path they wanted people to take. I quit because of it.






  • The pixel has a TPM chip (Trusted Protection Module). This is a device that has an internal cryptographic key set that can never be accessed outside of a lab with access to the die, like using red fuming nitric acid to get to the die without damaging the gold bond wires – type/class of access.

    The internal key of the device is used to create any additional keys you would like to make. It can also test the validity of any key it has generated and check the hash of any file. Hashing a file is ensuring it is unchanged using a key to ensure no one in the middle has altered or added to the file.

    Graphene uses this TPM chip to create a chain of trust with the device. It is essentially like secure boot on a computer. Anyone with control over a key like this is able to make changes to your device.

    No mobile devices contain documented hardware for the system on chip or the modem. Both of these are black boxes. Obviously the modem is a big concern. Google/Android is a scheme to make it as easy as possible for hardware manufacturers to build with Android using a kernel that only needs the hardware support binaries added at the last possible minute. There is no source code available for these binary kernel modules. The code is never added to the mainline Linux kernel. This is the mechanism used to deprecate your devices. These are orphaned kernels that are proprietary and cannot be properly maintained and updated because of these kernel modules for the physical hardware. The hardware is different enough that no one can reverse engineer it effectively and transfer that effort to other devices.

    You can never completely trust this hardware. We simply do not know what is there and what it can do. However, with a TPM module, we can make it irrelevant and simply discard any interaction or activities we do not understand. We can also verify that none of this hardware is altering or interfering with the OS or files on the device. Any changes will alter the result of the files hash. The inability to access or modify the TPM hidden key and its existence outside of the SoC is the reason Pixels are used and why other devices are insecure.