Skynet: Towards Synthetic Neurobiology
The original idea was a joke. I was looking at LLM loops and thinking about how they map onto Elixir’s actor model — GenServers that receive messages, process them, maybe spawn new processes. …
The original idea was a joke. I was looking at LLM loops and thinking about how they map onto Elixir’s actor model — GenServers that receive messages, process them, maybe spawn new processes. …
At some point at work I had to delete a large Elasticsearch index. Straightforward task, you’d think. The index had grown out of control, nothing useful in it anymore, and it was eating disk. …
Sometimes for various reasons I want to get one or more pull requests from github to my local copy of the repository. In the beginning I went as far as checking out the repository of whoever wrote the …
Disclaimer: I’m not a professional cryptographer or anything like that, I’ve found it interesting to dig deep into ECC and alike crypto, use at own risk and such :) BIG NOTE: After much …
What is a outproxy? A outproxy would be the same as a Tor exit node for http(s). It’s a way to allow your tunnel clients to exit via your router to the “clearnet”. Background History …
For a long time, at least internally it’s been talking about the need of a testnet for I2P. Testing in production isn’t trivial :) I’ve been on and off the mission in quiet for …
Have you ever cloned a git repository on a bad internet connection? I have, it don’t work. When I lived in the Philippines for a year and a half, I had to clone repositories to a server of mine …
Or in Russian; Позор Российскому руководству! Цензура это полный бред. NOTE: In the bottom, this text is translated into Russian by orignal from I2Pd. Thanks to him. I barely knows a word Russian …
Intel has this Control-flow Enforcement Technology (CET), as of October 20th 2017 there are no Intel processors currently being sold that support it yet. But it will be available sooner or later- …
TL;DR Since time is a factor here, \(2048\) bit is probably fine for most systems and users as long as it is replaced often, like let’s encrypt does with it’s ninety-day lifetimes. However …