• 0 Posts
  • 2.51K Comments
Joined 1 year ago
cake
Cake day: June 30th, 2023

help-circle
  • Technically, they could have. But it wouldn’t have really been Nirvana without Cobain. It was pretty much Cobain’s cult of personality. If they had tried to continue without him, it would have been another one of those bands that starkly contrasts between before and after and the comment above would have been about never knowing Nirvana in its heyday.

    Even if the continuation was good (and Dave Grohl is proof that there was enough talent for it in the rest of the band), it would have still been tainted by the lack of Cobain.


  • I’m not sure there’s any guarantee that it will ever be sorted, since bit flips will be random and are just as likely to put it more out of order than more in order. Plus if there’s any error correction going on, it can cancel out bit flips entirely until up to a certain threshold.

    Though I’m not sure if ECC (and other methods) write the corrected value back to memory or just correct the signals going to the core, so it’s possible they could still add up over time and overcome the second objection.










  • I don’t trust them either. But I can’t not trust them unless I trust you, which I don’t.

    This feels like a variation of that two guard riddle except the warning is “both guards lie all of the time” and the two guards still don’t agree.

    Which is resolved by the riddle itself being the lie. Applying that here means we should do the opposite and not (never trust anyone).

    Now which way does that not apply?

    • sometimes trust anyone
    • never distrust anyone
    • never trust noone
    • sometimes distrust anyone
    • never distrust noone
    • sometimes trust noone
    • sometimes distrust noone

  • Yeah, I think there is a lot of potential for code analysis. There’s a limited cross section of ways malware can do interesting things, but many permutations of ways to do that.

    So look for the interesting things, like:

    • accessing other programs’ address spaces
    • reading/writing files
    • deleting/moving files
    • sending/receiving network traffic
    • os system calls and console commands
    • interacting with hardware
    • spawning new processes
    • displaying things on the screen
    • accessing timing information

    Obviously there’s legitimate uses for each of these, so that’s just the first step.

    Next, analyze the data that is being used for that:

    • what’s the source?
    • what’s the destination?
    • what kind of transformations are being applied to the data?

    Then you can watch out for things like:

    • is it systematically going through directories and doing some operation to all files? (Maybe ransomware, data scrubbing, or just maliciously deleting stuff?)
    • is it grabbing data from somewhere and sending it somewhere else on the internet? (Stealing data?)
    • is it using timing information to build data? (Timing attacks to figure out kernel data that should be hidden?)
    • is it changing OS settings/setup?

    Then generate a report of everything it is doing and see if it aligns with what the code is supposed to do. Or you could even build some kind of permissions system around that with more sophistication than the basic “can this app access files? How about the internet?”

    Computer programs can be complex, but are ultimately made up of a series of simple operations and it’s possible to build an interpreter that can do those operations and then follow everything through to see exactly what is included in the massive amount of data it sends over the network so that you can tell your file sharing program is also for some reason sending /etc/passwords to a random address or listening for something to access a sequence of closed ports and then will do x, y, z, if that ever happens. Back doors could be obvious with the right analysis tools, especially if it’s being built from source code (though I believe it’s still possible with binaries, just maybe a bit harder).





  • There is a bit of a grass roots one, but part of the problem is that it’s entirely on the consumption side, as in people deciding to have less sugar. Even proposed legislation solutions involve controlling the consumption side, though at the final product production level.

    Which means that sugar producers are still trying to produce the maximum amount of sugar to make the most profit and the lowered demand just ends up driving the price down and makes it more attractive to others to add more sugar. If that lower price is still profitable, then sugar producers can continue full steam ahead.

    I’ve noticed something similar with plastics. Demand is lowered in some areas by legislation (like no plastic straws or single use bags), but plastic is still being produced at volume, so prices go down and other products switch from non-plastic packaging to plastic. I’ll call out Betty Crocker homestyle instant mashed potatoes specifically here, that went from a cardboard box containing two paper/metal pouches to a single plastic pouch, which also means it’s more of a pain to make only half the package and more likely to create more food waste in addition to plastic waste.


  • IMO Bethesda games are perfectly positioned to get a lot of initial interest because they look great and seem like they are full of depth, especially when in the midst of the opening quest chain, but the longer I look around, the more disappointed I end up with it all and then lose interest.

    It’s this weird mix of deep and shallow. Like in starfield, I walk up to a building and see a rich interaction between an NPC that wants to go in to talk with someone but the guard won’t let her in because he’s busy and no one can see him but then doesn’t bat an eye as I just waltz right past him and talk to whoever I want in there.

    Or I watch a confrontation between other NPCs and then try to interact with them after and it’s just generic responses, not a word about the heated argument that just ended.

    It’s like it’s in the uncanny valley, where it looks good enough to think you can RP at a certain level, but when you try to do so, it turns out to be all a facade unless there’s a quest.

    And in Skyrim, the NPCs were completely unable to handle stealth characters. You’d figure someone would have a magic spell or think to use a torch or raise an alarm when they get shot with an arrow. Nope, must have been the wind or my imagination that killed my buddy over there. I didn’t try stealth in starfield to see if they had improved on that at all.

    Each of their games feels like the same game with a new skin. It was fun for a while, but I’m over it now. I tried starfield on xbox game pass but have since cancelled. It’s on my steam wishlist but I won’t be grabbing it without a heavy sale, and even then I’m not really sure I want to allocate the disk space it wants to it.


  • Also when it gets boring, sometimes it can be fun to see what happens if you cause something unusual to happen.

    Ok, dinosaurs were fun for a bit, but how do they fare against meteor strikes? Hmm, these small ones keep burning up in the atmosphere. Ok, I bet THIS one won’t burn up! It will probably shake things up quite a bit in this regio–oh shit, debris from the impact is escaping orbit, that probably means it’s going to rain hot rocks for quite some time all over the planet. Dammit, it was cool when all of the land was together in one mass but I’ve cracked that apart now and they are going to end up splitting up into smaller continents now. When’s my last save state? Dammit, it’s mid Triassic, the dinosaurs were so lame back then compared to these ones today. Guess I’ll save now. I mean, they dominate the entire planet, surely they’ll come out of this ok.


  • That’s pretty smart, using it for legal documents. If the accuracy is high, it might be nice to just copy paste any tos or whatever to get the highlights in plain language (which imo should be a legal requirement of contracts in general, but especially ones written by a team of bad faith lawyers intended for people they don’t expect to read it and deliberately written to discourage reading the whole thing).