Hacker Newsnew | past | comments | ask | show | jobs | submit | spiorf's commentslogin

It's water that builds up limescale that it's harmful for the carnivorous plants. The peat moss substrate that carnivorous plants like is acidic and the limescale neutralizes that.


Plausible, perhaps -- is there any evidence?


Yes there is plenty of evidence that carnivorous plants die in alkaline or neutral soil conditions.

Read literally any book about caring for them. They like acidic soil. Rain water is slightly acidic.

It might take a year or more to kill a plant by slowly draining its soil of acidity. Just like it can take a year to kill a big plant via inadequate lighting.


We know how the next token is selected, but not why doing that repeatedly brings all the capabilities it does. We really don't understand how the emergent behaviours emerge.


It feels less like a word prediction algorithm and more like a world model compression algorithm. Maybe we tried to create one and accidentaly created the other?


Its almost like a Model of Language, but very Large


Why would asking a question about ice cream trigger a consideration about all possible topics? As in, to formulate the answer, the LLM will consider the origin of Elephants even. It won’t be significant, but it will be factored in.

Why? In the spiritual realm, many postulated that even the Elephant you never met is part of your life.

None of this is a coincidence.


Eh I feel like that mostly just down to; yes transformers are a "next token predictor" but during fine tuning for instruct the attention related wagon slapped on the back is partially hijacked as a bridge from input token->sequences of connections in the weights.

For example if I ask "If I have two foxes and I take away one, how many foxes do I have?" I reckon attention has been hijacked to essentially highlight the "if I have x and take away y then z" portion of the query to connect to a learned sequence from readily available training data (apparently the whole damn Internet) where there are plenty of examples of said math question trope, just using some other object type than foxes.

I think we could probably prove it by tracing the hyperdimensional space the model exists in and ask it variants of the same question/find hotspots in that space that would indicate it's using those same sequences (with attention branching off to ensure it replies with the correct object type that was referenced).


Bubblesort is the bestsort.


It works even on cheap webcams. Remove the piece of blue glass and replace it with the black plastic that covers the ir leds from an old remote.


I did it back enough in the day that I used a negative from getting pictures developed. I think I got the idea in Hardware Hacking Projects.


I did the same too, but funnily enough I stumbled upon it by accident when I was trying to find things that pass IR through but not visible light (like coke, sunglasses, ink etc.) using my Sony camera with nightvision mode. I was on a quest to get "x-ray vision".


I have one where I just removed the filter and added some IR led's for my 3d printer cam, that way I don't need visible light and the room can stay dark if I need it to be.


Playbook files are password protected archives. Anyone cares to reverse engineer the password from the executable?


The password seems to be "malte". The executable is completely unobfuscated .NET, and all you need for "reverse engineering" is ILSpy or DotPeek.

    public static void ExtractFile(string apbx, string file, string targetDir, bool recursive = false)
    {
      if (recursive)
        APBX.RunCommand("x \"" + file + "\" -o\"" + targetDir + "\" -p\"malte\" -y -r");
      else
        APBX.RunCommand("x \"" + apbx + "\" -o\"" + targetDir + "\" -p\"malte\" \"" + file + "\" -y -r-");
    }

    public static void ExtractArchive(string apbx, string targetDir, string exclude = null)
    {
      if (exclude != null)
        APBX.RunCommand("x \"" + apbx + "\" -o\"" + targetDir + "\" -p\"malte\" -x!\"" + exclude + "\" -y");
      else
        APBX.RunCommand("x \"" + apbx + "\" -o\"" + targetDir + "\" -p\"malte\" -y");
    }


Interesting; Malte is a common Danish, Swedish and Germanic male name.


Yikes, this alone is grounds to never ever ever use this tool, intentionally obfuscating what commands are being run is malware-level behavior


> Set the Archive format to 7z, and set malte as the password

https://docs.ameliorated.io/developers/playbooks/creation.ht...


password is "malte"

https://ibb.co/BNtHF1X


Huh, IDA can do .NET IL? Interesting.


What he means is that while the models tags code as code, for the model itself this is just relationship between tokens,like the code open and close tags,same as parenthesis, commas, uppercase or verbs and conjunctions...

What you say is achievable only if another system external to the model takes some tagged model output, makes computations or lookups, and feeds the results back to the model in the form of text input.

Then it's game on for the model to trigger some form of code execution through this external system and escape the jail...


When you run signature verification on that text with that signature and that address, it checks out. It wouldn't otherwise. The text links the two.


Can confirm. Did a double withdrawal (of about 10$ at the time) on an exchange years ago by blocking a POST request and firing two at the same time.

I alerted the exchange operator and he let me keep the 10$.


This reminds me of an episode of "Person of Interest" where a teacher tries to spark interest in his students by telling that all their life past and future events are already "encoded" in PI digits.

https://youtu.be/a6bT_DVwo7M



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: