Avatar
mark tyler
9baed03137d214b3e833059a93eb71cf4e5c6b3225ff7cd1057595f606088434
Bitcoin & šŸ«‚ Oh and dimly trying to think through interesting issues. I think that I don’t have a right to force you to do anything other than not harm me or others. Seems like most people I interact with in the real world disagree with this statement. To be fair.. the devil is in definition of ā€œharmā€.

What’s in the QR code? A lightning invoice? If so then not currently, thought bolt 12 will enable this.

Is it discriminatory to hire the smartest candidate?

How does doing so compare to other kinds of discrimination hiring managers sometimes employ? If you do think it’s discriminatory, why would you say we don’t talk about it much?

Replying to Avatar poe😱

One thing I love about this is that it solves gold’s purity determination problem by making it even harder to assay šŸ˜‚

Replying to Avatar :P

What’s up with primal?

ā€œAt the same time, a woman is seen crossing the street into oncoming traffic when a driver in the dark-colored car hits her. The impact throws her into the path of the self-driving car and she became pinned underneath it.

The driver of the other car, left the scene.

By the time firefighter arrived, no one else was around.ā€šŸ¤”

Also ā€œRescuers were able to contact the vehicle operator through the voice controls inside the robo-taxi. The vehicle was disabled to a stop.ā€ - did it not immediately stop? šŸ¤”

Love it. Hope it does. But not any time soon šŸ˜…

It’s crazy how much has changed.

Also, then: ā€œNot everything you see on the internet is trueā€

Now: ā€œnot every answer chatGPT gives is true, depending on the question, every answer it gives could be falseā€

I’m confused about how they are transcribing the audio and creating the embeddings if it’s ā€œprivate by designā€

I was going to say the same thing. Let me know if you cover it in an episode. Also - where is your podcast?

Thinking more, it will always be possible to store data on top of actively used one-time use memory. As long as the previous values are known. Doing this will impair device functionality to a greater or lesser extent depending on the register.

Maybe there is a way to burn any unused registers, and check the ones that don’t cause obvious failures on boot.

If attackers can write to enough registers to store the key, and they can recover the device, then they can get they key whether the device is bricked in the process or not. Comparisons to the wrench attack make this seem ok though.