Avatar

brie

brie@programming.dev
Joined
0 posts • 24 comments
Direct message

Proton gives data to governments if requested. Why are you trying to shill it?

permalink
report
parent
reply

Proton is already used for identity management: OTP via email. They’ll implement OAuth if there’s enough demand for it. A company’s purpose is to be profitable, ethics side is largely irrelevant.

Many countries already have digital government ID: Australia, Estonia, Russia.

permalink
report
parent
reply

Start bulking up by eating well, solid exercise routine, a bit of help from anabolic steroids. Pose with a formula-filled blackboard background shirtless while flexing your biceps for Instagram and Twitter. Become the math bodybuilding icon. Make jokes like “my muscles are not differentially equal to yours”. You should build an audience, and after that you’ll be able to expand into sponsorships, and OnlyFans. You can also do IRL prostitution, and earn thousands of $ per night. The key is to target either old hags, or rich homosexuals.

Good luck. Let your biceps look like the bell curve of a Gaussian distribution

permalink
report
reply

Because writing web apps is boring as fuck, and evaluating switching provides a reason to stop coding in PHP, and write an article about how they still need to write PHP.

permalink
report
parent
reply

It’s so much easier to quit social media when you’re on meth.

permalink
report
parent
reply

What about people who only have one device? Kids, elderly, people with only work computer.

permalink
report
parent
reply

Notice a few red flags. 1) they were contacted before the system was rolled out. Before anyone else could look for bugs 2) it is reported by techcrunch and is trending tech news 3) the exploits are rudimentary 90s era mistakes that even LLMs don’t make these days

So it’s likely that they paid McDonald’s India to pretend to have horrible practices. $240 is another tactic to appear good and trustworthy. That brings traffic to their blue team company site, effective advertising. Standard fakery that security faggots utilize to spread the FUD to create demand for their services.

permalink
report
parent
reply

Let me guess, you signed an NDA, and won’t tell anyone which brands had badly configured access control in their web apps?

Each red flag is okay, but all together is rather strange. It’s kinda classic to say that pajeets write shitty code.

permalink
report
parent
reply

Large gains were due to scaling the hardware, and data. The training algorithms didn’t change much, transformers allowed for higher parallelization. There are no signs of the process becoming self-improving. Agentic performance is horrible as you can see with Claude (15% of tasks successful).

What happens in the brain is a big mystery, and thus it cannot be mimicked. Biological neural networks do not exist, because the synaptic cleft is an artifact. The living neurons are round, and the axons are the result of dehydration with ethanol or xylene.

permalink
report
parent
reply