• 2 Posts
  • 121 Comments
Joined 2 years ago
cake
Cake day: December 16th, 2023

help-circle


  • For those that think the response is overblown, from the thread:

    These images are intended to be a drop-in replacement for Steam Deck OS for handheld console-like gaming PCs like the Steam Deck (Lenovo Legion Go, ASUS ROG Ally, MSI Claw, and other hardware in the same space).

    These are also to be used to create gaming theater PCs, for streamlined use on a living room television.

    The issue with “just using Flatpak or a container” is that the gamescope compositor simply does not work in those situations, when paired with Steam’s Gaming Mode, as it has the same concerns as a desktop environment. There would simply be no way to serve Gaming Mode as an environment.

    As such, moving to this would essentially force Bazzite, as a project, to abandon its primary reason for existing - alienating 2/3s of their userbase. The remaining 1/3s would be served a lesser experience for a variety of more paper cut reasons, and VR is already a complex topic which would get even worse.

    It’s a big deal because disallowing the native steam build would make it nearly impossible to run bazzite in a SteamOS-like experience (which accounts for 2/3s of bazzite’s users)





  • There’s a lot of assumptions about the reliability of the LLMs to get better over time laced into that…

    But so far they have gotten steadily better, so I suppose there’s enough fuel for optimists to extrapolate that out into a positive outlook.

    I’m very pessimistic about these technologies and I feel like we’re at the top of the sigma curve for “improvements,” so I don’t see LLM tools getting substantially better than this at analyzing code.

    If that’s the case I don’t feel like having hundreds and hundreds of false security reports creates the mental arena that allows for researchers to actually spot the non-false report among all the slop.


  • It found it 8/100 times when the researcher gave it only the code paths he already knew contained the exploit. Essentially the garden path.

    The test with the actual full suite of commands passed in the context only found it 1/100 times and we didn’t get any info on the number of false positives they had to wade through to find it.

    This is also assuming you can automatically and reliably filter out false negatives.

    He even says the ratio is too high in the blog post:

    That is quite cool as it means that had I used o3 to find and fix the original vulnerability I would have, in theory, done a better job than without it. I say ‘in theory’ because right now the false positive to true positive ratio is probably too high to definitely say I would have gone through each report from o3 with the diligence required to spot its solution.



  • The Blog Post from the researcher is a more interesting read.

    Important points here about benchmarking:

    o3 finds the kerberos authentication vulnerability in the benchmark in 8 of the 100 runs. In another 66 of the runs o3 concludes there is no bug present in the code (false negatives), and the remaining 28 reports are false positives. For comparison, Claude Sonnet 3.7 finds it 3 out of 100 runs and Claude Sonnet 3.5 does not find it in 100 runs.

    o3 finds the kerberos authentication vulnerability in 1 out of 100 runs with this larger number of input tokens, so a clear drop in performance, but it does still find it. More interestingly however, in the output from the other runs I found a report for a similar, but novel, vulnerability that I did not previously know about. This vulnerability is also due to a free of sess->user, but this time in the session logoff handler.

    I’m not sure if a signal to noise ratio of 1:100 is uh… Great…








  • As a guix user and package maintainer I’m ecstatic.

    I’m so proud of the community for rallying around the needs and pain points of everyone and making this decision. This reduces so many pain points for a guix user and will hopefully smooth out the package maintenance process a great deal. Email is simple but trying to do code change communication over it can be very complex and time-laborous.

    If you’re curious about functional packaging systems grab guix on your distro and give it a try!

    Special shout out to anyone burnt out on Nix lang. Come feel the warm embrace of Scheme’s parentheses. :)





  • I now have no respect for such people whatsoever, as they’ve demonstrated completely and thoroughly, even to the point where my dumb ass can notice, that the only thing that ever “qualified” them to “run a business” was having money.

    It’s always heartwarming when people wake up and realize it’s capital ism and not merit ism

    And you realize a lot of the books and media you’ve consumed that explicitly stated that weren’t just making a comment on a goofy side effect of that system but the entire enchilada.


  • WalnutLum@lemmy.mltoLinux@lemmy.mlMust install apps/tools
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    3 months ago

    guix and/or nix

    Both are functional package managers and manage dependency trees better than flatpak IMO (also the package description languages mean you can manipulate the package definitions at install time much easier)

    If you can’t find a package in guix/nix then it behooves you to use flatpak