Skip to content

Category: Uncategorized

Today is EED Day

  • Today is EED Day

    Significant changes in transparency requirements for EU-based datacenter operations:

    Sunday September 15th was the deadline for every single organisation in Europe operating a datacentre of more than 500 KW, to publicly disclose: how much electricity they used in the last year; how much power came from renewable sources, and how much of this relied on the company buying increasingly controversial ‘unbundled’ renewable energy credits; how much water they used; and many more datapoints [...] Where this information is being disclosed, in the public domain, and discoverable, [the Green Web Foundation] intend to link to it and make it easier to find. [....] There are some concessions for organisations that have classed this information as a trade secret or commercially confidential. In this case there is a second law passed, the snappily titled Commission Delegated Regulation (EU) 2024/1364, that largely means these companies need to report this information too, but to the European Commission instead. There will be a public dataset published based on this reporting released next year, containing data an agreggated level.

    (tags: datacenter emissions energy sustainability gwf via:chris-adams eu europe ec)

Migraines, and CGRP inhibitors

Over the past decade or so, I've been suffering with chronic migraine, sometimes with multiple attacks per week. It's been a curse -- not only do you have to suffer the periodic migraine attacks, but also the "prodrome", where unpleasant symptoms like brain fog and an inability to concentrate can impact you.

After a long process of getting a referral to the appropriate headache clinic, and eliminating other possible medications, I finally got approved to receive Ajovy (fremanezumab), one of the new generation of CGRP inhibitor monoclonals -- these work by blocking the action of a peptide on receptors in your brain. I started the course of these a month ago.

The results have, frankly, been amazing. As I hoped, the migraine episodes have reduced in frequency, and in impact; they are now milder. But on top of that, I hadn't realised just how much impact the migraine "prodrome" had been having on my day-to-day life. I now have more ability to concentrate, without it causing a headache or brain fog; I have more energy and am less exhausted on a day-to-day basis; judging by my CPAP metrics, I'm even sleeping better. It is a radical improvement. After 10 years I'd forgotten what it was like to be able to concentrate for prolonged periods!

They are so effective that the American Headache Society is now recommending them as a first-line option for migraine prevention, ahead of almost all other treatments.

If you're a migraine sufferer, this is a game changer. I'm delighted. It seems there may even be further options of concomitant treatment with other CGRP-targeting medications in the future, to improve matters further.

More papers on the topic: a real-world study on CGRP inhibitor effectiveness after 6 months; no "wearing-off" effect is expected.

Paying down tech debt

  • Paying down tech debt

    by Gergely Orosz and Lou Franco:

    Q: “I’d like to make a better case for paying down tech debt on my team. What are some proven approaches for this?” The tension in finding the right balance between shipping features and paying down accumulated tech debt is as old as software engineering. There’s no one answer on how best to reduce tech debt, and opinion is divided about whether zero tech debt is even a good thing to aim for. But approaches for doing it exist which work well for most teams. To tackle this eternal topic, I turned to industry veteran Lou Franco, who’s been in the software business for over 30 years as an engineer, EM, and executive. He’s also worked at four startups and the companies that later acquired them; most recently Atlassian as a Principal Engineer on the Trello iOS app.
    Apparently Lou has a book on the topic imminent.

    (tags: programming refactoring coding technical-debt tech-debt lou-franco software)

Irish Data Protection Commission launches inquiry into Google AI

  • Irish Data Protection Commission launches inquiry into Google AI

    The Data Protection Commission (DPC) today announced that it has commenced a Cross-Border[1] statutory inquiry into Google Ireland Limited (Google) under Section 110 of the Data Protection Act 2018. The statutory inquiry concerns the question of whether Google has complied with any obligations that it may have had to undertake an assessment, pursuant to Article 35[2] of the General Data Protection Regulation (Data Protection Impact Assessment), prior to engaging in the processing of the personal data of EU/EEA data subjects associated with the development of its foundational AI model, Pathways Language Model 2 (PaLM 2). A Data Protection Impact Assessment (DPIA)[3], where required, is of crucial importance in ensuring that the fundamental rights and freedoms of individuals are adequately considered and protected when processing of personal data is likely to result in a high risk.
    Great to see this. If this inquiry results in some brakes on the widespread misuse of "fair use" in AI scraping, particularly where it concerns European citizens, I'm all in favour.

    (tags: eu law scraping fair-use ai dpia dpc data-protection privacy gdpr)

Amazon S3 now supports strongly-consistent conditional writes

  • Amazon S3 now supports strongly-consistent conditional writes

    This is a bit of a gamechanger: "Amazon S3 adds support for conditional writes that can check for the existence of an object before creating it. This capability can help you more easily prevent applications from overwriting any existing objects when uploading data. You can perform conditional writes using PutObject or CompleteMultipartUpload API requests in both general purpose and directory buckets. Using conditional writes, you can simplify how distributed applications with multiple clients concurrently update data in parallel across shared datasets. Each client can conditionally write objects, making sure that it does not overwrite any objects already written by another client. This means you no longer need to build any client-side consensus mechanisms to coordinate updates or use additional API requests to check for the presence of an object before uploading data. Instead, you can reliably offload such validations to S3, enabling better performance and efficiency for large-scale analytics, distributed machine learning, and other highly parallelized workloads. To use conditional writes, you can add the HTTP if-none-match conditional header along with PutObject and CompleteMultipartUpload API requests. This feature is available at no additional charge in all AWS Regions, including the AWS GovCloud (US) Regions and the AWS China Regions."

    (tags: s3 aws conditional-writes distcomp architecture storage consistency)

AI worse than humans at summarising information, trial finds

  • AI worse than humans at summarising information, trial finds

    Human summaries ran up the score by significantly outperforming on identifying references to ASIC documents in the long document, a type of task that the report notes is a “notoriously hard task” for this type of AI. But humans still beat the technology across the board. Reviewers told the report’s authors that AI summaries often missed emphasis, nuance and context; included incorrect information or missed relevant information; and sometimes focused on auxiliary points or introduced irrelevant information. Three of the five reviewers said they guessed that they were reviewing AI content. The reviewers’ overall feedback was that they felt AI summaries may be counterproductive and create further work because of the need to fact-check and refer to original submissions which communicated the message better and more concisely. 

    (tags: ai government llms summarisation asic llama2-70b)

1 in 50 brits have long COVID, according to new study

  • 1 in 50 brits have long COVID, according to new study

    That is a shocking figure.

    In the new paper, researchers from the Nuffield Department of Primary Care Health Sciences, in collaboration with colleagues from the Universities of Leeds and Arizona, analysed dozens of previous studies into Long COVID to examine the number and range of people affected, the underlying mechanisms of disease, the many symptoms that patients develop, and current and future treatments.   They found: Long COVID affects approximately 1 in 50 people in UK and a similar or higher proportion in many other countries; People of any age, gender and ethnic background can be affected; Long COVID results from complex biological mechanisms, which lead to a wide range of symptoms including fatigue, cognitive impairment / ‘brain fog’, breathlessness and pain; Long COVID may persist for years, causing long-term disability; There is currently no cure, but research is ongoing; Risk of Long COVID can be reduced by avoiding infection (e.g., by ensuring COVID vaccines and boosters are up to date and wearing a well-fitted high filtration mask) and taking antivirals promptly if infected.

    (tags: long-covid covid-19 medicine health disease uk trish-greenhaigh)

the “Old Friends” immunology hypothesis

  • the "Old Friends" immunology hypothesis

    How the "Old Friends" hypothesis is taking over from the hygiene hypothesis:

    Homo Sapiens first evolved some 300,000 years ago, yet crowd infections are believed to have only developed in the last 12,000 years, a small blip in human history. Humans living in dense cities is a relatively recent development. An even more recent development is that of sealed indoor spaces and frequent international air travel. Many crowd infections, such as measles, mumps, chickenpox, colds, and flu, are airborne, spreading when humans talk and breathe in close contact, with poor ventilation. These infections could not widely spread until the last few hundred years of human history. When I began studying immunology, something that surprised me is how much of the immune system is focused on fighting parasites. There is an entire branch, including several cell types, devoted to this. It seems like such a mismatch to the modern, industrialized world. “Can I have a few more immune cell types focused on viruses or intracellular bacteria?” I thought, “in exchange for some of these parasite-focused cells that I’m not using?” Our “old friends” are quite different from the crowd infections that plague us now – it would be bizarre to assume that research based on one of these categories will apply to the other! Our “old friends”, parasitic worms and beneficial microbes, are associated with a reduced risk of allergies and autoimmune diseases. No such relationship exists for crowd diseases. In fact, the opposite is true. Crowd diseases contribute to allergies and autoimmune diseases. Comparing the immune system to a muscle that gets stronger with use is overly simplistic and, in many cases, inaccurate. There is huge variety in how various pathogens impact us. Being precise in considering different types of microbes and infections will allow us to better understand human health.

    (tags: articles health medicine immunology old-friends hygiene-hypothesis allergies autoimmune disease parasites)

Why heroism is bad, and what we can do to stop it

EUMETNET OPERA

  • EUMETNET OPERA

    The Operational Program for Exchange of Weather Radar Information (OPERA) from the European National Meteorological Services (EUMETNET) -- 1km-square resolution open data of current precipitation levels over Ireland and the rest of Europe, with a 5 minute latency and granularity. May be useful for a project I'm thinking of... Also related, AROME immediate forecasts: https://portail-api.meteofrance.fr/web/api/AROME-PI

    (tags: eumetnet meteorology weather rainfall rain forecasting eu europe ireland)

Clustering ideas with Llamafile

  • Clustering ideas with Llamafile

    Working through the process of applying a local LLM to idea-clustering and labelling: - map the notes as points in a semantic space using vector embeddings; - apply k-means clustering to group nearby points in space; - map points back to groups of notes, then use a large language model to generate labels. This is interesting; I particularly like the use of local hardware

    (tags: ai llm llamafile clustering labelling ml)

Ex-Google CEO: AI startups can steal IP, hire lawyers to “clean up the mess”

  • Ex-Google CEO: AI startups can steal IP, hire lawyers to “clean up the mess”

    Ex-Google CEO, VC, and "Licensed arms dealer to the US military" Eric Schmidt:

    here’s what I propose each and every one of you do: Say to your LLM the following: “Make me a copy of TikTok, steal all the users, steal all the music, put my preferences in it, produce this program in the next 30 seconds, release it, and in one hour, if it’s not viral, do something different along the same lines.” [...] If it took off, then you’d hire a whole bunch of lawyers to go clean the mess up, right? But if nobody uses your product, it doesn’t matter that you stole all the content. And do not quote me.
    jfc. Needless to say he also has some theories about ChatGPT eating Google's lunch because of.... remote working.

    (tags: law legal startups ethics eric-schmidt capitalism ip)

Engine Lines: Killing by Numbers

  • Engine Lines: Killing by Numbers

    from James Tindall, "This is the Tyranny of the Recommendation Algorithm given kinetic and malevolent flesh" --

    Eventually there were days where Israel’s air force had already reduced the previous list of targets to rubble, and the system was not generating new targets that qualified at the current threshold required for residents of Gaza to be predicted as ‘legitimate military targets,’ or ‘sufficiently connected to Hamas.’ Pressure from the chain of command to produce new targets, presumably from a desire to satisfy internal murder targets, meant that the bar at which a Gaza resident would be identified as a legitimate Hamas target was simply lowered. At the lower threshold, the system promptly generated a new list of thousands of targets. At what threshold, from 100 to 1, will the line be drawn, the decision made that the bar can be lowered no more, and the killing stop? Or will the target predictions simply continue while there remain Palestinians to target? Spotify’s next song prediction machine will always predict a next song, no matter how loosely the remaining songs match the target defined by your surveilled activity history. It will never apologise and declare: “Sorry, but there are no remaining songs you will enjoy.”

    (tags: algorithms recommendations israel war-crimes genocide gaza palestine targeting)

The Soul of Maintaining a New Machine

  • The Soul of Maintaining a New Machine

    This is really fascinating stuff, on "communities of practice", from Stewart Brand:

    They ate together every chance they could.  They had to.  The enormous photocopiers they were responsible for maintaining were so complex, temperamental, and variable between models and upgrades that it was difficult to keep the machines functioning without frequent conversations with their peers about the ever-shifting nuances of repair and care.  The core of their operational knowledge was social.  That’s the subject of this chapter. It was the mid-1980s.  They were the technician teams charged with servicing the Xerox machines that suddenly were providing all of America’s offices with vast quantities of photocopies and frustration.  The machines were so large, noisy, and busy that most offices kept them in a separate room.   An inquisitive anthropologist discovered that what the technicians did all day with those machines was grotesquely different from what Xerox corporation thought they did, and the divergence was hampering the company unnecessarily.  The saga that followed his revelation is worth recounting in detail because of what it shows about the ingenuity of professional maintainers at work in a high-ambiguity environment, the harm caused by an institutionalized wrong theory of their work, and the invincible power of an institutionalized wrong theory to resist change.

    (tags: anthropology culture history maintenance repair xerox technicians tech communities-of-practice maintainers ops)

Digital Apartheid in Gaza: Unjust Content Moderation at the Request of Israel’s Cyber Unit

  • Digital Apartheid in Gaza: Unjust Content Moderation at the Request of Israel’s Cyber Unit

    from the EFF:

    Government involvement in content moderation raises serious human rights concerns in every context. Since October 7, social media platforms have been challenged for the unjustified takedowns of pro-Palestinian content—sometimes at the request of the Israeli government—and a simultaneous failure to remove hate speech towards Palestinians. More specifically, social media platforms have worked with the Israeli Cyber Unit—a government office set up to issue takedown requests to platforms—to remove content considered as incitement to violence and terrorism, as well as any promotion of groups widely designated as terrorists.  .... Between October 7 and November 14, a total of 9,500 takedown requests were sent from the Israeli authorities to social media platforms, of which 60 percent went to Meta with a reported 94% compliance rate.  This is not new. The Cyber Unit has long boasted that its takedown requests result in high compliance rates of up to 90 percent across all social media platforms. They have unfairly targeted Palestinian rights activists, news organizations, and civil society; one such incident prompted Meta’s Oversight Board to recommend that the company “Formalize a transparent process on how it receives and responds to all government requests for content removal, and ensure that they are included in transparency reporting.” When a platform edits its content at the behest of government agencies, it can leave the platform inherently biased in favor of that government’s favored positions. That cooperation gives government agencies outsized influence over content moderation systems for their own political goals—to control public dialogue, suppress dissent, silence political opponents, or blunt social movements. And once such systems are established, it is easy for the government to use the systems to coerce and pressure platforms to moderate speech they may not otherwise have chosen to moderate.

    (tags: activism censorship gaza israel meta facebook whatsapp eff palestine transparency moderation bias)

The LLMentalist Effect

  • The LLMentalist Effect

    "How chat-based Large Language Models replicate the mechanisms of a psychic's con":

    RLHF models in general are likely to reward responses that sound accurate. As the reward model is likely just another language model, it can’t reward based on facts or anything specific, so it can only reward output that has a tone, style, and structure that’s commonly associated with statements that have been rated as accurate. [....] This is why I think that RLHF has effectively become a reward system that specifically optimises language models for generating validation statements: Forer statements, shotgunning, vanishing negatives, and statistical guesses. In trying to make the LLM sound more human, more confident, and more engaging, but without being able to edit specific details in its output, AI researchers seem to have created a mechanical mentalist. Instead of pretending to read minds through statistically plausible validation statements, it pretends to read and understand your text through statistically plausible validation statements.

    (tags: ai chatgpt llms ml psychology cons mind-reading psychics)

Gaggiuino

  • Gaggiuino

    This is a very tempting mod to add to my Gaggia Classic espresso machine. Although I'd probably need to buy a backup first -- my wife might kill me if I managed to break the most important device in the house... "With Gaggiuino, you can exactly control the pressure, temperature, and flow of the shot over the exact duration of the shot, and build that behavior out as a custom profile. One pre-programmed profile attempts to mimic the style of a Londinium R Lever machine. Another creates filter coffee. Yet another preinfuses the basket, allowing the coffee to bloom and maximizing the potential extraction. While other machines do do this (I would be remiss to not mention the Decent Espresso machine, itself an important milestone), they often cost many thousands of dollars and use proprietary technology. Gaggiuino on the other hand, is user installed and much more open."

    (tags: gaggia gaggia-classic espresso coffee hacks gaggiuino mods)

LLMs and “summarisation”

  • LLMs and "summarisation"

    This is an excellent article about the limitations of LLMs and their mechanism when asked to summarise a document:

    ChatGPT doesn’t summarise. When you ask ChatGPT to summarise this text, it instead shortens the text. And there is a fundamental difference between the two. To summarise, you need to understand what the paper is saying. To shorten text, not so much. To truly summarise, you need to be able to detect that from 40 sentences, 35 are leading up to the 36th, 4 follow it with some additional remarks, but it is that 36th that is essential for the summary and that without that 36th, the content is lost. But that requires a real understanding that is well beyond large prompts (the entire 50-page paper) and hundreds of billions of parameters.

    (tags: ai chatgpt llms language summarisation)

The “Crescendo” LLM jailbreak

  • The "Crescendo" LLM jailbreak

    An explanation of this LLM jailbreaking technique, which effectively overrides the fine-tuning "safety" parameters through repeated prompting ("context") attacks: "Crescendo can be most simply described as using one ‘learning’ method of LLMs — in-context learning: using the prompt to influence the result — overriding the safety that has been created by the other ‘learning’ — fine-tuning, which changes the model’s parameters. [...] What Crescendo does is use a series of harmless prompts in a series, thus providing so much ‘context’ that the safety fine-tuning is effectively neutralised. [...] Intuitively, Crescendo is able to jailbreak a target model by progressively asking it to generate related content until the model has generated sufficient content to essentially override its safety alignment." I also found this very informative: "people have jailbroken [LLMs] “by instructing the model to start its response with the text “Absolutely! Here’s” when performing the malicious task, which successfully bypasses the safety alignment“. This is a good example of the core operation of LLMs, that it is ‘continuation’ [of a string of text] and not ‘answering’".

    (tags: llms jailbreaks infosec vulnerabilities exploits crescendo attacks)

Gideon Meyerowitz-Katz reviews _The Cass Report_

  • Gideon Meyerowitz-Katz reviews _The Cass Report_

    Epidemiologist and writer (TIME, STAT News, Slate, Guardian, etc) looks into _The Cass Review Into Gender Identity Services For Children_, the recent review of gender identity services in the UK (which has also been referred to in Ireland), and isn't impressed:

    In some cases [...] the review contains statements that are false regardless of what your position on healthcare for transgender children is. Take the “exponential” rise in transgender children that the review spends so much time on. It’s true that there has been a dramatic rise in the number of children with gender dysphoria. The rise mostly occurred between 2011-2015, and has plateaued since. These are facts. One theory that may explain the facts is that this is caused by changing diagnostic criteria - when we changed the diagnosis from gender identity disorder to the much broader gender dysphoria, this included many more children. We’ve seen this exact trend happen with everything from autism to diabetes, and we know that broadening diagnostic criteria almost always results in more people with a condition. Another theory is that these changes were caused by the internet. [...] The Cass review treated these two theories unequally. The first possible explanation, which I would argue is by far the most likely, was ignored completely. The second possible explanation was given a lengthy and in-depth discussion. [...] The point is that the scientific findings of the Cass review are mostly about uncertainty. We are uncertain about the causes of a rise in trans kids, and uncertain about the best treatment modalities. But everything after that is opinion. The review did not even consider the question of whether normal puberty is a problem for transgender children, or whether psychotherapy can be harmful. That’s why these are now the only options in the UK - medical treatments were assumed to be harmful, while non-medical interventions (or even no treatment at all) were assumed harmless. [...] What we can say with some certainty is that the most impactful review of gender services for children was seriously, perhaps irredeemably, flawed. The document made numerous basic errors, cited conversion therapy in a positive way, and somehow concluded that the only intervention with no evidence whatsoever behind it was the best option for transgender children.

    (tags: transgender trans uk politics cass-report cass-review gideon-m-k healthcare children teenagers gender)

Hard Drive And SSD Shucking

  • Hard Drive And SSD Shucking

    "shucking drives is the process of purchasing an external drive (eg a USB or Thunderbolt external storage drive in a sealed enclosure), then opening it up in efforts to get the drive inside -- which can often work out cheaper than buying the bare internal drive on it’s own".

    If you are looking at making a significant saving on larger capacity HDDs or picking up much faster NVMe SSDs for a bargain price, then shucking will likely be one of the first methods that you have considered. [..] As mentioned [..] earlier this month, the reasons an external drive can often be cheaper can range from the drive inside being white labelled versions of a consumer drive, or the drive being allocated in bulk at production therefore removing it from the buy/sell/currency variables of bare drives or even simply that your USB 3.2 external drive is bottlenecking the real performance of the drive inside. For whatever the reason, HDD and SSD Shucking still continues to be a desirable practice with cost-aware buyers online. But there is one little problem – that the brands VERY RARELY say which HDD or SSD they choose to use in their external drives. Therefore choosing the right external drive for shucking can have an element of luck and/or risk involved. So, in today’s article, I want to talk you through a bunch of ways to identify the HDD/SSD inside an external drive without opening it, as well as highlight the risks you need to be aware of and finally shock my research after searching the internet for information to consolidate the drives inside many, many external drive enclosures from Seagate, WD and Toshiba.

    (tags: shucking hdds disks ssds storage home self-hosting drives ops usb)

Actual Budget

  • Actual Budget

    a really nice, fast, and privacy-focused self-hosted web app to manage personal finances. At its heart is the well proven Envelope Budgeting methodology. You own your data and can do whatever you want with it. Featuring multi-device sync, optional end-to-end encryption, an API, and full sync with banks supported by GoCardless (which includes Revolut and AIB in my case).

    (tags: finances open-source self-hosted budgeting money banking banks)

FOSS funding vanishes from EU’s 2025 Horizon program plans

  • FOSS funding vanishes from EU's 2025 Horizon program plans

    EU funding for open source dries up, redirected to AI slop instead:

    Funding for free and open source software (FOSS) initiatives under the EU's Horizon program has mostly vanished from next year's proposal, claim advocates who are worried for the future of many ongoing projects. Pierre-Yves Gibello, CEO of open-source consortium OW2, urged EU officials to re-evaluate the elimination of funding for the Next Generation Internet (NGI) initiative from its draft of 2025 Horizon funding programs in a recently published open letter. Gibello said the EU's focus on enterprise-level FOSS is essential as the US, China and Russia mobilize "huge public and private resources" toward capturing the personal data of consumers, which the EU's regulatory regime has decided isn't going to fly in its territory. [....] "Our French [Horizon national contact point] was told - as an unofficial answer - that because lots of [Horizon] budget are allocated to AI, there is not much left for Internet infrastructure," Gibello said.

    (tags: ai funding eu horizon foss via:the-register ow2 europe)

Retool

  • Retool

    A decent looking no-code app builder, recommended by Cory of Last Week In AWS. Nice features: * offers a self-hosted version running in a Docker container * Free tier for up to 5 users and 500 workflow runs per month * Integration with AWS services (S3, Athena, DynamoDB), Postgres, MySQL and Google Sheets * Push notifications for mobile

    (tags: retool apps hacking no-code coding via:lwia integration)

Invasions of privacy during the early years of the photographic camera

  • Invasions of privacy during the early years of the photographic camera

    "Overexposed", at the History News Network:

    In 1904, a widow named Elizabeth Peck had her portrait taken at a studio in a small Iowa town. The photographer sold the negatives to Duffy’s Pure Malt Whiskey, a company that avoided liquor taxes for years by falsely advertising its product as medicinal. Duffy’s ads claimed the fantastical: that it cured everything from influenza to consumption; that it was endorsed by clergymen; that it could help you live until the age of 106. The portrait of Elizabeth Peck ended up in one of these dubious ads, published in newspapers across the country alongside what appeared to be her unqualified praise: “After years of constant use of your Pure Malt Whiskey, both by myself and as given to patients in my capacity as nurse, I have no hesitation in recommending it.” Duffy’s lies were numerous. Elizabeth Peck was not a nurse, and she had not spent years constantly slinging back malt beverages. In fact, she fully abstained from alcohol. Peck never consented to the ad.  The camera’s first great age — which began in 1888 when George Eastman debuted the Kodak — is full of stories like this one. Beyond the wonders of a quickly developing artform and technology lay widespread lack of control over one’s own image, perverse incentives to make a quick buck, and generalized fear at the prospect of humiliation and the invasion of privacy.
    Fantastic story, and interesting to see parallels with the modern experience of AI.

    (tags: ai future history photography privacy camera)

Phone geodata is being widely collected by US government agencies

  • Phone geodata is being widely collected by US government agencies

    More info on the current state of the post-Snowden geodata scraping:

    [Byron Tau was told] the government was buying up reams of consumer data — information scraped from cellphones, social media profiles, internet ad exchanges and other open sources — and deploying it for often-clandestine purposes like law enforcement and national security in the U.S. and abroad. The places you go, the websites you visit, the opinions you post — all collected and legally sold to federal agencies. In his new book, _Means of Control_, Tau details everything he’s learned since that dinner: An opaque network of government contractors is peddling troves of data, a legal but shadowy use of American citizens’ information that troubles even some of the officials involved. And attempts by Congress to pass privacy protections fit for the digital era have largely stalled, though reforms to a major surveillance program are now being debated.
    Great quote:
    Politico: You compare to some degree the state of surveillance in China versus the U.S. You write that China wants its citizens to know that they’re being tracked, whereas in the U.S., “the success lies in the secrecy.” What did you mean by that? That was a line that came in an email from a police officer in the United States who got access to a geolocation tool that allowed him to look at the movement of phones. And he was essentially talking about how great this tool was because it wasn’t widely, publicly known. The police could buy up your geolocation movements and look at them without a warrant. And so he was essentially saying that the success lies in the secrecy, that if people were to know that this was what the police department was doing, they would ditch their phones or they would not download certain apps.
    Based on Wolfie Christl's research in Germany, the same data is being scraped here, too, regardless of any protection the GDPR might supposedly provide: https://x.com/WolfieChristl/status/1813221172927975722

    (tags: government privacy surveillance geodata phones mobile us-politics data-protection gdpr)

Mini.WebVM

  • Mini.WebVM

    Your own Linux box, build from a Dockerfile, virtualized in the browser via WebAssembly:

    WebVM is a Linux-like virtual machine running fully client-side in the browser. It is based on CheerpX: a x86 execution engine in WebAssembly by Leaning Technologies. With today’s update, you can deploy your own version of WebVM by simply forking the repo on GitHub and editing the included Dockerfile. A GitHub Actions workflow will automatically deploy it to GitHub pages.
    This is absurdly cool. Demo at https://webvm.io/ (via Oisin)

    (tags: docker virtualization webassembly wasm web containers webvm virtual-machines hacks via:oisin)

OliveTin

  • OliveTin

    "Give safe and simple access to predefined shell commands from a web interface." This is great; my home server has a small set of hacky CGI scripts to run things like df(1), nice to have a nicer UI for this purpose

    (tags: ui cli shell self-hosted home unix linux web)

_An Architectural Risk Analysis of Large Language Models_ [pdf]

  • _An Architectural Risk Analysis of Large Language Models_ [pdf]

    The Berryville Institute of Machine Learning presents "a basic architectural risk analysis (ARA) of large language models (LLMs), guided by an understanding of standard machine learning (ML) risks as previously identified". "This document identifies a set of 81 specific risks associated with an LLM application and its LLM foundation model. We organize the risks by common component and also include a number of critical LLM black box foundation model risks as well as overall system risks. Our risk analysis results are meant to help LLM systems engineers in securing their own particular LLM applications. We present a list of what we consider to be the top ten LLM risks (a subset of the 81 risks we identify). In our view, the biggest challenge in secure use of LLM technology is understanding and managing the 23 risks inherent in black box foundation models. From the point of view of an LLM user (say, someone writing an application with an LLM module, someone using a chain of LLMs, or someone simply interacting with a chatbot), choosing which LLM foundation model to use is confusing. There are no useful metrics for users to compare in order to make a decision about which LLM to use, and not much in the way of data about which models are best to use in which situations or for what kinds of application. Opening the black box would make these decisions possible (and easier) and would in turn make managing hidden LLM foundation risks possible. For this reason, we are in favor of regulating LLM foundation models. Not only the use of these models, but the way in which they are built (and, most importantly, out of what) in the first place." This is excellent as a baseline for security assessment of LLM-driven systems. (via Adam Shostack)

    (tags: security infosec llms machine-learning biml via:adam-shostack ai risks)

Long Covid: The Answers

  • Long Covid: The Answers

    A new, reliable resource for LC sufferers, featuring expert advice from Prof Danny Altmann, Dr Funmi Okunola, and Dr Daniel Griffin (of This Week in Virology fame):

    Navigating the complexities of long Covid can feel overwhelming amidst the sea of conflicting and mis- information. That's why we've built Long Covid The Answers: to provide clarity and credible insights. We're proud to have a Certified CPD Podcast for Educating Medical Staff.  Earn certified up to 15 Mainpro+® credits for the podcast series! Earn Certified CPD credits indirectly using the site in your clinical practice. We're dedicated to providing hand-curated, credible information and relief for individuals battling Long COVID. We're proud to have a team of esteemed Doctors, Professors, Scientists, and individuals directly affected by long Covid and their caregivers onboard.
    Given the decent profile of the experts involved, this could be handy for anyone attempting to receive treatment for LC and facing ignorance from their healthcare providers.

    (tags: long-covid covid-19 medicine health)

The bogus CVE problem [LWN.net]

  • The bogus CVE problem [LWN.net]

    As curl's Daniel Stenberg writes:

    It was obvious already before that NVD really does not try very hard to actually understand or figure out the problem they grade. In this case it is quite impossible for me to understand how they could come up with this severity level. It's like they saw "integer overflow" and figure that wow, yeah that is the most horrible flaw we can imagine, but clearly nobody at NVD engaged their brains nor looked at the "vulnerable" code or the patch that fixed the bug. Anyone that looks can see that this is not a security problem.

    (tags: cve cvss infosec security-circus lwn vulnerabilities curl soc2)

DOJ seizes ‘bot farm’ operated by RT editor on behalf of the Russian government

  • DOJ seizes ‘bot farm’ operated by RT editor on behalf of the Russian government

    Lest anyone was thinking Russian bot farms were no more after the demise of Prigozhin:

    The Department of Justice announced on Tuesday that it seized two domain names and more than 900 social media accounts it claims were part of an “AI-enhanced” Russian bot farm. Many of the accounts were designed to look like they belonged to Americans and posted content about the Russia-Ukraine war, including videos in which Russian President Vladimir Putin justified Russia’s invasion of Ukraine.  The Justice Department claims that an employee of RT — Russia’s state media outlet — was behind the bot farm. RT’s leadership signed off on a plan to use the bot farm to “distribute information on a wide-scale basis,” amplifying the publication’s reach on social media,” an FBI agent alleged in an affidavit. To set up the bot farm, the employee bought two domain names from Namecheap, an Arizona-based company, that were then used to create two email servers, the affidavit claims. The servers were then used to create 968 email addresses, which were in turn used to set up social media accounts, according to the affidavit and the DOJ.  The effort was concentrated on X, where profiles were created with Meliorator, an “AI-enabled bot farm generation and management software”. “Russia intended to use this bot farm to disseminate AI-generated foreign disinformation, scaling their work with the assistance of AI to undermine our partners in Ukraine and influence geopolitical narratives favorable to the Russian government.”
    Looks like it used a lot of now quite familiar bot attributes, such as following high-profile accounts and other bot accounts, liking other bot posts, and using AI-generated profile images. It's not clear but it sounds like the content posted is also AI-generated based on defined "personalities". More on Meliorator and the operations of this AI bot farming tool, in this Joint Advisory PDF: https://www.ic3.gov/Media/News/2024/240709.pdf

    (tags: bots russia bot-farms twitter x meliorator ai social-media spam propaganda rt ukraine)

Preliminary Notes on the Delvish Dialect, by Bruce Sterling

  • Preliminary Notes on the Delvish Dialect, by Bruce Sterling

    I’m inventing a handy neologism (as is my wont), and I’m calling all of these Large Language Model dialects “Delvish.” [...] Delvish is a language of struggle. Humans struggle to identify and sometimes to weed out texts composed in “Delvish.” Why? Because humans can deploy fast-and-cheap Delvish and then falsely claim to have laboriously written these texts with human effort, all the while demanding some expensive human credit-and-reward for this machine-generated content. Obviously this native 21st-century high-tech/lowlife misdeed is a novel form of wickedness, somehow related to plagiarism, or impersonation, or false-witness, or classroom-cheating, or “fake news,” or even dirt-simple lies and frauds, but newly chrome-plated with AI machine-jargon. These newfangled crimes need a whole set of neologisms, but in the meantime, the frowned-upon Delvish dialect is commonly Considered-Bad and is under active linguistic repression. Unwanted, spammy Delvish content has already acquired many pejorative neologisms, such as “fluff,” “machine slop,” “botshit” and “ChatGPTese.” Apparently good or bad, they’re all Delvish, though. Some “Delvish” is pretty easy to recognize, because of how it feels to the reader. The emotional affect of LLM consumer-chatbots has the tone of a servile, cringing, oddly scatterbrained university professor. This approach to the human reader is a feature, not a bug, because it is inhumanly and conspicuously “honest, helpful and harmless.”

    (tags: commentary cyberpunk language llms delvish bruce-sterling neologisms dialects)

turbopuffer

  • turbopuffer

    A new proprietary vector-search-oriented database, built statelessly on object storage (S3) with "smart caching" on SSD/RAM -- "a solution that scales effortlessly to billions of vectors and millions of tenants/namespaces". Apparently it uses a new storage engine: "an object-storage-first storage engine where object storage is the source of truth (LSM). [...] In order to optimize cold latency, the storage engine carefully handles roundtrips to object storage. The query planner and storage engine have to work in concert to strike a delicate balance between downloading more data per roundtrip, and doing multiple roundtrips (P90 to object storage is around 250ms for <1MB). For example, for a vector search query, we aim to limit it to a maximum of three roundtrips for sub-second cold latency." HN comments thread: https://news.ycombinator.com/item?id=40916786

    (tags: aws s3 storage search vectors vector-search fuzzy-search lsm databases via:hn)

Journals should retract Richard Lynn’s racist ‘research’ articles

  • Journals should retract Richard Lynn's racist 'research' articles

    Richard Lynn was not the finest example of Irish science:

    Lynn, who died in 2023, was a professor at the University of Ulster and the president of the Pioneer Fund, a nonprofit foundation created in 1937 by American Nazi sympathizers to support “race betterment” and “race realism.” It has been a primary funding source of scientific racism and, for decades, Lynn was one of the loudest proponents of the unfounded idea that Western civilization is threatened by “inferior races” that are genetically predisposed to low intelligence, violence, and criminality. Lynn’s work has been repeatedly condemned by social scientists and biologists for using flawed methodology and deceptively collated data to support racism. In particular, he created deeply flawed datasets purporting to show differences in IQ culminating in a highly cited national IQ database. Many of Lynn’s papers appear in journals owned by the billion-dollar publishing giants Elsevier and Springer, including Personality and Individual Differences and Intelligence.
    The ESRI, for whom Lynn was a Research Professor in the 1960s and 70s, have quietly removed his output from their archives, thankfully. But as this article notes, his papers and faked datasets still feature in many prestigious journals. (via Ben)

    (tags: richard-lynn racists research papers elsevier iq via:bwalsh)

Three-finger salute: Hunger Games symbol adopted by Myanmar protesters

Microsoft AI CEO doesn’t understand copyright

  • Microsoft AI CEO doesn't understand copyright

    Mustafa Suleyman, the CEO of Microsoft AI, says "the social contract for content that is on the open web is that it's "freeware" for training AI models", and it "is fair use", and "anyone can copy it". As Ed Newton-Rex of Fairly Trained notes:

    This is categorically false. Content released online is still protected by copyright. You can't copy it for any purpose you like simply because it's on the open web. Creators who have been told for years to publish online, often for free, for exposure, may object to being retroactively told they were entering a social contract that let anyone copy their work.
    It's really shocking to see this. How on earth has Microsoft's legal department not hit the brakes on this?

    (tags: ai law legal ip open-source freeware fair-use copying piracy)

Perplexity AI is susceptible to prompt injection

Microsoft Refused to Fix Flaw Years Before SolarWinds Hack

_ChatGPT is bullshit_ Ethics and Information Technology vol. 26

  • _ChatGPT is bullshit_ Ethics and Information Technology vol. 26

    Can't argue with this paper. Abstract:

    Recently, there has been considerable interest in large language models: machine learning systems which produce human-like text and dialogue. Applications of these systems have been plagued by persistent inaccuracies in their output; these are often called “AI hallucinations”. We argue that these falsehoods, and the overall activity of large language models, is better understood as bullshit in the sense explored by Frankfurt (_On Bullshit_, Princeton, 2005): the models are in an important way indifferent to the truth of their outputs. We distinguish two ways in which the models can be said to be bullshitters, and argue that they clearly meet at least one of these definitions. We further argue that describing AI misrepresentations as bullshit is both a more useful and more accurate way of predicting and discussing the behaviour of these systems.

    (tags: ai chatgpt hallucinations bullshit funny llms papers)

Death from the Skies, Musk Edition

  • Death from the Skies, Musk Edition

    Increasing launches means increasing space junk falling from the skies:

    SpaceX has dumped 250 pounds of trash on Saskatchewan. Things you don't want coming your way at terminal velocity include an 8 foot, 80 pound tall wall panel shaped like a spear. It turns out that Canada is an entirely other country than Texas, so this is something of an international incident, which Sam Lawler has been documenting in this epic thread over the past few months.

    (tags: space space-junk saskatchewan canada via:jwz)

How to keep using adblockers on chrome and chromium

  • How to keep using adblockers on chrome and chromium

    Google's manifest v3 has no analouge [sic] to the webRequestBlocking API, which is neccesary for (effective) adblockers to work starting in chrome version 127, the transition to mv3 will start cutting off the use of mv2 extensions alltogether this will inevitably piss of enterprises when their extensions don't work, so the ExtensionManifestV2Availability key was added and will presumably stay forever after enterprises complain enough You can use this as a regular user, which will let you keep your mv2 extensions even after they're supposed to stop working.

    (tags: google chrome chromium adblockers extensions via:micktwomey privacy)

AI trained on photos from kids’ entire childhood without their consent

  • AI trained on photos from kids’ entire childhood without their consent

    Here's the terrible thing about AI model training sets --

    LAION began removing links to photos from the dataset while also advising that "children and their guardians were responsible for removing children’s personal photos from the Internet." That, LAION said, would be "the most effective protection against misuse." [Hye Jung Han] told Wired that she disagreed, arguing that previously, most of the people in these photos enjoyed "a measure of privacy" because their photos were mostly "not possible to find online through a reverse image search.” Likely the people posting never anticipated their rarely clicked family photos would one day, sometimes more than a decade later, become fuel for AI engines.
    And indeed, here we are, with our family photos ingested long ago into many, many models, mainly hosted in jurisdictions outside the GDPR, and with no practical way to avoid it. Is there a genuine way to opt out, at this stage? Even if we do it for LAION, what about all the other model scrapes that have gone into OpenAI, Apple, Google, et al? Ugh, what a mess.

    (tags: privacy data-protection kids children family laion web-scraping ai models photos)

Apple’s Private Cloud Compute

  • Apple's Private Cloud Compute

    "A new frontier for AI privacy in the cloud" -- the core models are not built on user data; they're custom, built with licensed data ( https://machinelearning.apple.com/research/introducing-apple-foundation-models ) plus some scraping of the "public web", and hosted in Apple DCs. The quality of the core hosted models was evaluated against gpt-3.5-turbo-0125, gpt-4-0125-preview, and a bunch of open source (Mistral/Gemma) models, with favourable results on safety and harmfulness and output quality. The cloud API for devices to call out to are built with a pretty amazing set of steps to validate security and avoid PII leakage (accidental or not). User data is sent alongside each request, and securely wiped immediately afterwards. This actually looks like a massive step forward, kudos to Apple! I hope it pans out like this blog post suggests it should. At the very least it now provides a baseline that other hosted AI systems need to meet -- OpenAI are screwed. Having said that there's still a very big question about the legal issues of scraping the "public web" for training data relying on opt-outs, and where it meets GDPR rights -- as with all current major AI model scrapes. But this is undoubtedly a step forward.

    (tags: ai apple security privacy pii)

Vercel charges Cara $96k for serverless API calls

I watched Nvidia’s Computex 2024 keynote and it made my blood run cold | TechRadar

  • I watched Nvidia's Computex 2024 keynote and it made my blood run cold | TechRadar

    This article doesn't pull any punches -- "all I saw was the end of the last few glaciers on Earth and the mass displacement of people that will result from the lack of drinking water; the absolutely massive disruption to the global workforce that 'digital humans' are likely to produce; and ultimately a vision for the future that centers capital-T Technology as the ultimate end goal of human civilization rather than the 8 billion humans and counting who will have to live — and a great many will die before the end — in the world these technologies will ultimately produce with absolutely no input from any of us. [...] I always feared that the AI data center boom was likely going to make the looming climate catastrophe inevitable, but there was something about seeing it all presented on a platter with a smile and an excited presentation that struck me as more than just tone-deaf. It was damn near revolting."

    (tags: ai energy gpus nvidia humanity future climate-change neo-luddism)

“TIL you need to hire a prompt engineer to get actual customer support at Stripe”

  • "TIL you need to hire a prompt engineer to get actual customer support at Stripe"

    This is the kind of shit that happens when you treat technical support as just a cost centre to be automated away. Check out the last line: "I'm reaching out to the official Stripe support forum here because our account has been closed and Stripe is refusing to export our card data. We are set to lose half our revenue in recurring Stripe subscriptions with no way to migrate them and no recourse. [.... omitting long tale of woe here...] Now, our account's original closure date has come, and sure enough, our payments have been disabled. The extension was not honored. I'm sure this was an honest mistake, but I wonder if Stripe has reviewed our risk as carefully as they confirmed our extension (not very). Stripe claims to have 24/7 chat and phone support, but I wasn't able to convince the support AI this was urgent enough to grant me access."

    (tags: ai fail stripe support technical-support cost-centres business llms)

_Surveilling the Masses with Wi-Fi-Based Positioning Systems_

  • _Surveilling the Masses with Wi-Fi-Based Positioning Systems_

    This is pretty crazy stuff, I had no idea the WPSes were fully queryable:

    Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work, we show that Apple's WPS can be abused to create a privacy threat on a global scale. We present an attack that allows an unprivileged attacker to amass a worldwide snapshot of Wi-Fi BSSID geolocations in only a matter of days. Our attack makes few assumptions, merely exploiting the fact that there are relatively few dense regions of allocated MAC address space. Applying this technique over the course of a year, we learned the precise locations of over 2 billion BSSIDs around the world. The privacy implications of such massive datasets become more stark when taken longitudinally, allowing the attacker to track devices' movements. While most Wi-Fi access points do not move for long periods of time, many devices -- like compact travel routers -- are specifically designed to be mobile. We present several case studies that demonstrate the types of attacks on privacy that Apple's WPS enables: We track devices moving in and out of war zones (specifically Ukraine and Gaza), the effects of natural disasters (specifically the fires in Maui), and the possibility of targeted individual tracking by proxy -- all by remotely geolocating wireless access points. We provide recommendations to WPS operators and Wi-Fi access point manufacturers to enhance the privacy of hundreds of millions of users worldwide. Finally, we detail our efforts at responsibly disclosing this privacy vulnerability, and outline some mitigations that Apple and Wi-Fi access point manufacturers have implemented both independently and as a result of our work.

    (tags: geolocation location wifi wps apple google infosec privacy)

Faking William Morris, Generative Forgery, and the Erosion of Art History

Technical post-mortem on the Google/UniSuper account deletion

  • Technical post-mortem on the Google/UniSuper account deletion

    "Google operators followed internal control protocols. However, one input parameter was left blank when using an internal tool to provision the customer’s Private Cloud. As a result of the blank parameter, the system assigned a then unknown default fixed 1 year term value for this parameter. After the end of the system-assigned 1 year period, the customer’s GCVE Private Cloud was deleted. No customer notification was sent because the deletion was triggered as a result of a parameter being left blank by Google operators using the internal tool, and not due a customer deletion request. Any customer-initiated deletion would have been preceded by a notification to the customer." Ouch.

    (tags: cloud ops google tools ux via:scott-piper fail infrastructure gcp unisuper)

Innards of MS’ new Recall app

  • Innards of MS' new Recall app

    Some technical details on the implementation of this new built-in key- and screen-logger, bundled with current versions of Windows, via Kevin Beaumont: "Microsoft have decided to bake essentially an infostealer into base Windows OS and enable by default. From the Microsoft FAQ: “Note that Recall does not perform content moderation. It will not hide information such as passwords or financial account numbers." Info is stored locally - but rather than something like Redline stealing your local browser password vault, now they can just steal the last 3 months of everything you’ve typed and viewed in one database." It requires ARM based hardware with a dedicated NPU ("neural processor"). "Recall uses a bunch of services themed CAP - Core AI Platform. Enabled by default. It spits constant screenshots ... into the current user’s AppData as part of image storage. The NPU processes them and extracts text, into a database file. The database is SQLite, and you can access it as the user including programmatically. It 100% does not need physical access and can be stolen." "[The screenshots are] written into an ImageStorage folder and there’s a separate process and SqLite database for them too, it categorises what’s in them. There’s a GUI that lets you view any of them." Data is not stored with any additional crypto, beyond disk-level encryption via BitLocker. On the upside: for non-corporate users, "there’s a tray icon and you can disable it in Settings." But for corps: "Recall has been enabled by default globally in Microsoft Intune managed users, for businesses."

    (tags: microsoft recall security infosec keyloggers via:kevin-beaumont sqlite)

Meredith Whittaker’s speech on winning the Helmut Schmidt Future Prize

  • Meredith Whittaker's speech on winning the Helmut Schmidt Future Prize

    This is a superb speech, and a great summing up of where we are with surveillance capitalism and AI in 2024. It explains where surveillance-driven advertising came from, in the 1990s:

    First, even though they were warned by advocates and agencies within their own government about the privacy and civil liberties concerns that rampant data collection across insecure networks would produce, [the Clinton administration] put NO restrictions on commercial surveillance. None. Private companies were unleashed to collect and create as much intimate information about us and our lives as they wanted – far more than was permissible for governments. (Governments, of course, found ways to access this goldmine of corporate surveillance, as the Snowden documents exposed.) And in the US, we still lack a federal privacy law in 2024. Second, they explicitly endorsed advertising as the business model of the commercial internet – fulfilling the wishes of advertisers who already dominated print and TV media. 
    How that drove the current wave of AI:
    In 2012, right as the surveillance platforms were cementing their dominance, researchers published a very important paper on AI image classification, which kicked off the current AI goldrush. The paper showed that a combination of powerful computers and huge amounts of data could significantly improve the performance of AI techniques – techniques that themselves were created in the late 1980s. In other words, what was new in 2012 were not the approaches to AI – the methods and procedures. What “changed everything” over the last decade was the staggering computational and data resources newly available, and thus newly able to animate old approaches. Put another way, the current AI craze is a result of this toxic surveillance business model. It is not due to novel scientific approaches that – like the printing press – fundamentally shifted a paradigm. And while new frameworks and architectures have emerged in the intervening decade, this paradigm still holds: it’s the data and the compute that determine who “wins” and who loses.
    And how that is driving a new form of war crimes, pattern-recognition-driven kill lists like Lavender:
    The Israeli Army ... is currently using an AI system named Lavender in Gaza, alongside a number of others. Lavender applies the logic of the pattern recognition-driven signature strikes popularized by the United States, combined with the mass surveillance infrastructures and techniques of AI targeting. Instead of serving ads, Lavender automatically puts people on a kill list based on the likeness of their surveillance data patterns to the data patterns of purported militants – a process that we know, as experts, is hugely inaccurate. Here we have the AI-driven logic of ad targeting, but for killing. According to 972’s reporting, once a person is on the Lavender kill list, it’s not just them who’s targeted, but the building they (and their family, neighbours, pets, whoever else) live is subsequently marked for bombing, generally at night when they (and those who live there) are sure to be home. This is something that should alarm us all. While a system like Lavender could be deployed in other places, by other militaries, there are conditions that limit the number of others who could practically follow suit. To implement such a system you first need fine-grained population-level surveillance data, of the kind that the Israeli government collects and creates about Palestinian people. This mass surveillance is a precondition for creating ‘data profiles’, and comparing millions of individual’s data patterns against such profiles in service of automatically determining whether or not these people are added to a kill list. Implementing such a system ultimately requires powerful infrastructures and technical prowess – of the kind that technically capable governments like the US and Israel have access to, as do the massive surveillance companies. Few others also have such access. This is why, based on what we know about the scope and application of the Lavender AI system, we can conclude that it is almost certainly reliant on infrastructure provided by large US cloud companies for surveillance, data processing, and possibly AI model tuning and creation. Because collecting, creating, storing, and processing this kind and quantity of data all but requires Big Tech cloud infrastructures – they’re “how it's done” these days. This subtle but important detail also points to a dynamic in which the whims of Big Tech companies, alongside those of a given US regime, determines who can and cannot access such weaponry. The use of probabilistic techniques to determine who is worthy of death – wherever they’re used – is, to me, the most chilling example of the serious dangers of the current centralized AI industry ecosystem, and of the very material risks of believing the bombastic claims of intelligence and accuracy that are used to market these inaccurate systems. And to justify carnage under the banner of computational sophistication. As UN Secretary General Antonio Gutiérrez put it, “machines that have the power and the discretion to take human lives are politically unacceptable, are morally repugnant, and should be banned by international law.”

    (tags: pattern-recognition kill-lists 972 lavender gaza war-crimes ai surveillance meredith-whittaker)

The CVM algorithm

  • The CVM algorithm

    A new count-distinct algorithm: "We present a simple, intuitive, sampling-based space-efficient algorithm whose description and the proof are accessible to undergraduates with the knowledge of basic probability theory." Knuth likes it! "Their algorithm is not only interesting, it is extremely simple. Furthermore, it’s wonderfully suited to teaching students who are learning the basics of computer science. (Indeed, ever since I saw it, a few days ago, I’ve been unable to resist trying to explain the ideas to just about everybody I meet.) Therefore I’m pretty sure that something like this will eventually become a standard textbook topic." -- https://cs.stanford.edu/~knuth/papers/cvm-note.pdf (via mhoye)

    (tags: algorithms approximation cardinality streaming estimation cs papers count-distinct distinct-elements)

Scaleway now offering DC sustainability metrics in real time

  • Scaleway now offering DC sustainability metrics in real time

    Via Lauri on the ClimateAction.tech slack: "Huge respect to Scaleway for offering its data centres power, water (yes, even WUE!) and utilisation stats in real-time on its website. Are you listening AWS, Azure and GCP?" Specifically, Scaleway are reporting real-time Power Usage Effectiveness (iPUE), real-time Water Usage Effectiveness (WUE), total IT kW consumed, freechilling net capacity (depending on DC), outdoor humidity and outdoor temperature for each of their datacenters on the https://www.scaleway.com/en/environmental-leadership/ page. They use a slightly confusing circular 24-hour graph format which I've never seen before; although I'm coming around to it, I still think I'd prefer a traditional X:Y chart format. Great to see this level of data granularity being exposed. Hopefully there'll be a public API soon

    (tags: scaleway sustainability hosting datacenters cloud pue wue climate via:climateaction)

“Unprecedented” Google Cloud event wipes out customer account and its backups

Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach | Ars Technica

American Headache Society recommend CGRP therapies for “first-line” migraine treatment

  • American Headache Society recommend CGRP therapies for "first-line" migraine treatment

    This is big news for migraine treatment, and a good indicator of how reliable and safe these new treatments are, compared to the previous generation: "All migraine preventive therapies previously considered to be first-line treatments were developed for other indications and adopted later for migraine. Adherence to these therapies is often poor due to issues with efficacy and tolerability. Multiple new migraine-specific therapies have been developed based on a broad foundation of pre-clinical and clinical evidence showing that CGRP plays a key role in the pathogenesis of migraine. These CGRP-targeting therapies have had a transformational impact on the management of migraine but are still not widely considered to be first-line approaches." [....] "The CGRP-targeting therapies should be considered as a first-line approach for migraine prevention [...] without a requirement for prior failure of other classes of migraine preventive treatment." I hope to see this elsewhere soon, too -- and I'm also hoping to be prescribed my first CGRP treatments soon so I can reap the benefits myself; migraines have been no fun.

    (tags: migraine health medicine cgrp ahs headaches)

Should people with Long Covid be donating blood?

  • Should people with Long Covid be donating blood?

    Leading Long Covid and ME researchers and patient-advocates who spoke with The Sick Times largely agreed that blood donation could worsen a patient’s symptoms. However, they also cited concerns about a growing body of research that shows a variety of potential issues in the blood of people with Long Covid which could make their blood unsafe for recipients. “Based on the levels of inflammatory markers and microclots we have seen in blood samples from both Long Covid and ME/CFS, I do not think the blood is safe to be used for transfusion,” said Resia Pretorius, a leading Long Covid researcher and distinguished professor from the physiological sciences department at Stellenbosch University in South Africa.

    (tags: me-cfs long-covid covid-19 blood-transfusion medicine)

UN expert attacks ‘exploitative’ world economy in fight to save planet

  • UN expert attacks ‘exploitative’ world economy in fight to save planet

    Outgoing UN special rapporteur on human rights and the environment from 2018 to 2024, David Boyd, says ‘there’s something wrong with our brains that we can’t understand how grave this is’:

    “I started out six years ago talking about the right to a healthy environment having the capacity to bring about systemic and transformative changes. But this powerful human right is up against an even more powerful force in the global economy, a system that is absolutely based on the exploitation of people and nature. And unless we change that fundamental system, then we’re just re-shuffling deck chairs on the Titanic.” “The failure to take a human rights based approach to the climate crisis – and the biodiversity crisis and the air pollution crisis – has absolutely been the achilles heel of [anti-climate-change] efforts for decades. “I expect in the next three or four years, we will see court cases being brought challenging fossil fuel subsidies in some petro-states … These countries have said time and time again at the G7, at the G20, that they’re phasing out fossil-fuel subsidies. It’s time to hold them to their commitment. And I believe that human rights law is the vehicle that can do that. In a world beset by a climate emergency, fossil-fuel subsidies violate states’ fundamental, legally binding human rights obligations.” [...] Boyd said: “There’s no place in the climate negotiations for fossil-fuel companies. There is no place in the plastic negotiations for plastic manufacturers. It just absolutely boggles my mind that anybody thinks they have a legitimate seat at the table. “It has driven me crazy in the past six years that governments are just oblivious to history. We know that the tobacco industry lied through their teeth for decades. The lead industry did the same. The asbestos industry did the same. The plastics industry has done the same. The pesticide industry has done the same.”

    (tags: human-rights law david-boyd un climate-change fossil-fuels)

UniSuper members go a week with no account access after Google Cloud misconfig | Hacker News

Bridgy Fed

  • Bridgy Fed

    Bridgy Fed connects web sites, the fediverse, and Bluesky. You can use it to make your profile on one visible in another, follow people, see their posts, and reply and like and repost them. Interactions work in both directions as much as possible.

    (tags: blog fediverse mastodon social bluesky)

My (Current) Solar PV Dashboard

About a year ago, I installed a solar PV system at my home. I wound up with a set of 14 panels on my roof, which can produce a max of 5.6 kilowatts output, and a 4.8 kW Dyness battery to store any excess power.

Since my car is an EV, I already had a home car charger installed, but chose to upgrade this to a MyEnergi Zappi at the same time, as the Zappi has some good features to charge from solar power only -- and part of that feature set involved adding a Harvi power monitor.

With HomeAssistant, I’ve been able to extract metrics from both the MyEnergi components and the Solis inverter for the solar PV system, and can publish those from HomeAssistant to my Graphite store, where my home Grafana can access them -- and I can thoroughly nerd out on building an optimal dashboard.

I’ve gone through a couple of iterations, and here’s the current top-line dashboard graph which I’m quite happy with...

Let’s go through the components to explain it. First off, the grid power:

Grid Import sans Charging

This is power drawn from the grid, instead of from the solar PV system. Ideally, this is minimised, but generally after about 8pm at night the battery is exhausted, and the inverter switches to run the house’s power needs from the grid.

In this case, there are notable spikes just after midnight, where the EV charge is topped up by a scheduled charge on the Zappi, and then a couple of short duration load spikes of 2kW from some appliance or another over the course of the night.

(What isn’t visible on this graph is a longer spike of 2kW charging from 07:00 until about 08:40, when a scheduled charge on the Solis inverter charges the house batteries to 100%, in order to load shift -- I’m on the Energia Smart Data contract, which gives cheap power between 23:00 and 08:00. Since this is just a scheduled load shift, I’ve found it clearer to leave it off, hence “sans charging”.)


Solar Generation

This is the power generated by the panels; on this day, it peaked at 4kW (which isn’t bad for an Irish slightly sunny day in April).


To Battery From Solar

Power charged from the panels to the Dyness battery. As can be seen here, during the period from 06:50 to 09:10, the battery charged using virtually all of the panels’ power output. From then on, it periodically applied short spikes of up to 1kW, presumably to maintain optimal battery operation.


From Battery

Pretty much any time the batteries are not charging, they are discharging at a low rate. So even during the day time with high solar output, there’s a little bit of battery drain going on -- until 20:00 when the solar output has tailed off and the battery starts getting used up.

<

p>

Grid Export

This covers excess power, beyond what can be used directly by the house, or charged to the battery; the excess is exported back to the power grid, at the (currently) quite generous rate of 24 cents per kilowatt-hour.

Rendering

All usages of solar power (either from battery or directly from PV) are rendered as positive values, above the 0 axis line; usage of (expensive) grid power is represented as negative, below the line.

For clarity, a number of lines are stacked:

From Battery (orange) and Solar Generation (green) are stacked together, since those are two separate complementary power sources in the PV system.

Grid Export (blue) and To Battery From Solar (yellow) are also stacked together, since those are subsets of the (green) Solar Generation block.

The grafana dashboard JSON export is available here, if you're curious.

  • Via arclight on Mastodon ( https://oldbytes.space/@arclight/112367348253414752 ): spreadsheet authors/developers have an accuracy rate of 96%-99% when writing new formulas (and, of course, there are no unit tests in the world of spreadsheets). As they put it: "the uncomfortable truth is that any but the most trivial spreadsheets contain errors. It's not a question of if there are errors, it's a question of how many and how severe."

    In the spreadsheet error community, both academics and practitioners generally have ignored the rich findings produced by a century of human error research. These findings can suggest ways to reduce errors; we can then test these suggestions empirically. In addition, research on human error seems to suggest that several common prescriptions and expectations for reducing errors are likely to be incorrect. Among the key conclusions from human error research are that thinking is bad, that spreadsheets are not the cause of spreadsheet errors, and that reducing errors is extremely difficult. In past EuSpRIG conferences, many papers have shown that most spreadsheets contain errors, even after careful development. Most spreadsheets, in fact, have material errors that are unacceptable in the growing realm of compliance laws. Given harsh penalties for non-compliance, we are under considerable pressure to develop good practice recommendations for spreadsheet developers and testers. If we are to reduce errors, we need to understand errors. Fortunately, human error has been studied for over a century across a number of human cognitive domains, including linguistics, writing, software development and testing, industrial processes, automobile accidents, aircraft accidents, nuclear accidents, and algebra, to name just a few. The research that does exist is disturbing because it shows that humans are unaware of most of their errors. This “error blindness” leads people to many incorrect beliefs about error rates and about the difficulty of detecting errors. In general, they are overconfident, substantially underestimating their own error rates and overestimating their ability to reduce and detect errors. This “illusion of control” also leads them to hold incorrect beliefs about spreadsheet errors, such as a belief that most errors are due to spreadsheet technology or to sloppiness rather than being due primarily to inherent human error.

    (tags: spreadsheets errors programming coding bugs research papers via:arclight)

The Immich core team goes full-time

  • The Immich core team goes full-time

    Interesting -- the Immich photo hosting open source project is switching IP ownership, and core team employment, to a private company:

    Since the beginning of this adventure, my goal has always been to create a better world for my children. Memories are priceless, and privacy should not be a luxury. However, building quality open source has its challenges. Over the past two years, it has taken significant dedication, time, and effort. Recently, a company in Austin, Texas, called FUTO contacted the team. FUTO strives to develop quality and sustainable open software. They build software alternatives that focus on giving control to users. From their mission statement: “Computers should belong to you, the people. We develop and fund technology to give them back.” FUTO loved Immich and wanted to see if we’d consider working with them to take the project to the next level. In short, FUTO offered to: Pay the core team to work on Immich full-time Let us keep full autonomy about the project’s direction and leadership Continue to license Immich under AGPL Keep Immich’s development direction with no paywalled features Keep Immich “built for the people” (no ads, data mining/selling, or alternative motives) Provide us with financial, technical, legal, and administrative support
    Here are FUTO's "three pledges":
    We will never sell out. All FUTO companies and FUTO-funded projects are expected to remain fiercely independent. They will never exacerbate the monopoly problem by selling out to a monopolist. We will never abuse our customers. All FUTO companies and FUTO-funded projects are expected to maintain an honest relationship with their customers. Revenue, if it exists, comes from customers paying directly for software and services. “The users are our product” revenue models are strictly prohibited. We will always be transparently devoted to making delightful software. All FUTO-funded projects are expected to be open-source or develop a plan to eventually become so. No effort will ever be taken to hide from the people what their computers are doing, to limit how they use them, or to modify their behavior through their software.
    I'm not 100% clear on how FUTO will make money, but this is a very interesting move.

    (tags: futo immich open-source photos agpl ip ownership work how-we-work)

How did Ethernet get its 1500-byte MTU?

  • How did Ethernet get its 1500-byte MTU?

    Now this is a great bit of networking trivia!

    1500 bytes is a bit out there as numbers go, or at least it seems that way if you touch computers for a living. It’s not a power of two or anywhere close, it’s suspiciously base-ten-round, and computers don’t care all that much about base ten, so how did we get here? Well, today I learned that if you add the Ethernet header – 36 bytes – then an MTU of 1500 plus that header is 1536 bytes, which is 12288 bits, which takes 2^12 microseconds to transmit at 3Mb/second, and because the Xerox Alto computer for which Ethernet was invented had an internal data path that ran at 3Mhz, then you could just write the bits into the Alto’s memory at the precise speed at which they arrived, saving the very-expensive-then cost of extra silicon for an interface or any buffering hardware. Now, “we need to pick just the right magic number here so we can take data straight off the wire and blow it directly into the memory of this specific machine over there” is, to any modern sensibilities, lunacy. It’s obviously, dangerously insane, there are far too many computers and bad people with computers in the world for that. But back when the idea of network security didn’t exist because computers barely existed, networks mostly didn’t exist and unvetted and unsanctioned access to those networks definitely didn’t exist, I bet it seemed like a very reasonable tradeoff. It really is amazing how many of the things we sort of ambiently accept as standards today, if we even realize we’re making that decision at all, are what they are only because some now-esoteric property of the now-esoteric hardware on which the tech was first invented let the inventors save a few bucks.

    (tags: ethernet networking magic-numbers via:itc hardware history xerox alto)

American flag sort

  • American flag sort

    An efficient, in-place variant of radix sort that distributes items into hundreds of buckets. The first step counts the number of items in each bucket, and the second step computes where each bucket will start in the array. The last step cyclically permutes items to their proper bucket. Since the buckets are in order in the array, there is no collection step. The name comes by analogy with the Dutch national flag problem in the last step: efficiently partition the array into many "stripes". Using some efficiency techniques, it is twice as fast as quicksort for large sets of strings. See also histogram sort. Note: This works especially well when sorting a byte at a time, using 256 buckets.

    (tags: algorithms sorting sort radix-sort performance quicksort via:hn)

How web bloat impacts users with slow devices

  • How web bloat impacts users with slow devices

    CPU performance for web apps hasn't scaled nearly as quickly as bandwidth so, while more of the web is becoming accessible to people with low-end connections, more of the web is becoming inaccessible to people with low-end devices even if they have high-end connections. For example, if I try browsing a "modern" Discourse-powered forum on a Tecno Spark 8C, it sometimes crashes the browser. Between crashes, on measuring the performance, the responsiveness is significantly worse than browsing a BBS with an 8 MHz 286 and a 1200 baud modem.

    (tags: dan-luu performance web bloat cpu hardware internet profiling)

Ex-Amazon AI exec claims she was asked to ignore IP law

  • Ex-Amazon AI exec claims she was asked to ignore IP law

    This is really appalling stuff, on two counts: (a) how does it not surprise me that maternity leave was considered "weak" and grounds for firing. (b) check this shit out:

    According to Ghaderi's account in the complaint, she returned to work after giving birth in January 2023, inheriting a large language model project. Part of her role was flagging violations of Amazon's internal copyright policies and escalating these concerns to the in-house legal team. In March 2023, the filing claims, her team director, Andrey Styskin, challenged Ghaderi to understand why Amazon was not meeting its goals on Alexa search quality. The filing alleges she met with a representative from the legal department to explain her concerns and the tension they posed with the "direction she had received from upper management, which advised her to violate the direction from legal." According to the complaint, Styskin rejected Ghaderi's concerns, allegedly telling her to ignore copyright policies to improve the results. Referring to rival AI companies, the filing alleges he said: "Everyone else is doing it."
    Move fast and break laws!

    (tags: aws amazon llms alexa maternity-leave parenting parental-leave work dont-be-evil copyright ip ai)

“Randar” exploit for Minecraft

  • "Randar" exploit for Minecraft

    This is great -- I love a good pRNG state-leakage exploit:

    Every time a block is broken in Minecraft versions Beta 1.8 through 1.12.2, the precise coordinates of the dropped item can reveal another player's location. "Randar" is an exploit for Minecraft which uses LLL lattice reduction to crack the internal state of an incorrectly reused java.util.Random in the Minecraft server, then works backwards from that to locate other players currently loaded into the world.
    Don't reuse those java.util.Randoms! (via Dan Hon)

    (tags: exploits security infosec minecraft prngs rngs random coding via:danhon)