• 2 Posts
  • 359 Comments
Joined 4 years ago
cake
Cake day: January 17th, 2022

help-circle








  • utopiah@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    arrow-up
    2
    ·
    3 days ago

    Thanks, it’s quite interesting but again IMHO it relies on bad practices. If you’ve been compromised and you “restore” (not in an sandboxed environment dedicated to study the threat) then you are asking for trouble. I’ll read a bit more in depth but the timeline I see 1987, 1998, 2017 show me this is a very very niche strategy, to the point that it’s basically irrelevant. Again it’s good to know of it, conceptually, but in practice proper backups (namely of data) remains in my eyes the best way to mitigate most problems, attacks and just back luck (failing hardware, fire, etc) alike.


  • utopiah@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    arrow-up
    2
    ·
    3 days ago

    That doesn’t make much sense to me, one backup data, not executables or system. Even if they were to be saved in the backup then they wouldn’t get executed back.

    Anyway, that’s still conceptually interesting but it’s so very niche I’d be curious to hear where it’s being used, any reference to read on where those exist in the wild?



  • utopiah@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    edit-2
    3 days ago

    Nothing needs an antivirus if you backup your data properly.

    PS: I’m getting downvoted for this so I’ll explain a bit more : if you backup properly, you can restore your data. Sure your system is fucked… but who cares? In fact if you care for your OS installation then right away it shows you are NOT in a reliable state. You install another OS and start from there. Maybe it’s not even due to a virus, maybe your hardware burns in fire, same situation so IMHO a working backup (and by working I mean rolling, like TODAY it’s done without your intervention) then you restore. Also please don’t tell me about ransomware because even though it is a real threat, if you do your backups properly (as in not overwritting the old ones with the new ones) then you are still safe. It can be as basic as using rdiff-backup. It’s fundamental to understand the difference between what’s digital and what is not digital.


  • Still watching it but this shouldn’t be surprising.

    The whole point of US politics was to isolate China out of the “AI revolution” by depriving it to top of the line chip.

    Meanwhile China has been building the entire World electronic ecosystem bar few very specific high end components, leaving these to TSMC, ASML, etc or design mostly to the US.

    Even before tariffs and sale bans (due to dual use concerns) China already had a chip independence plan dating back from at least 2000. Since then close to the entire World move production there, at least assembly, and most deals to do so included, or tried to, include IP transfer and at the very least learning with the partner, if not more but that’d be just speculation, to add industrial espionage on top (even though plenty of news on the topic).

    So… sure, it’s happening. Now the question though I asked on such thread countless time is basically : what’s the yield?

    Because producing 1 board to send to a tester is already an incredible feat but that doesn’t mean thousands or even millions can be produced. If they can, that also doesn’t mean they can be produced economically efficiently, regardless of subsidies.

    PS: most interesting book on the topic IMHO : https://en.wikipedia.org/wiki/Chip_War


  • You did. Well my point is that nobody needs this kind of equipment in the first place anyway because 99% of “useful” stuff done by an average officeworker isn’t actually LLM it’s usually STT. The rest, e.g. GenAI with videos is for shit&giggles, vibe coding doesn’t work except few super tiny narrow cases (e.g. transforming a file quickly without caring for 100% accuracy and when converters don’t already exist) and last but not least genAI on text itself is mostly used for spam, scan and cheating at school.

    So… please don’t felt “left behind” if you can’t self host this kind of tools, it seems to me it’s nearly never justifiable!





  • Typically my debugging process goes like this :

    • error message? Search for it online with the most unique keyword that aren’t machine specific
      • solutions provided?
        • solution understood? try it then loop back, writing notes in own wiki
        • solution not understood? bookmark it then try understood solutions first, if not try and loop back
    • no error message?
      • find where the error message is!
        • what actually produce the error from the top of the stack? end-user software? service? kernel? hardware? where do they put logs?
          • if logs exist and verbosity is not sufficient, increase verbosity and reproduce the problem
      • if no verbose enough error message can be obtained, repeat the situation in various conditions
        • does any condition make it work?
          • search on the difference between the working and non-working condition
        • backtrack one layer up the stack, e.g. if end-user software does not change, try service, etc
          • does this one provide logs?

    So… it’s basically always the same, namely try the lazy way (error log search) and if that’s not enough, try further down the stack or more unknown BUT always get information out the try.

    TL;DR: I have no idea but if another new machine (e.g. phone) can connect then DHCP works. FWIW NetworkManager logs are in journalctl -u NetworkManager and you can manually add/remove Ethernet connections. I’d physically unplug then plug back the cable with WiFi disabled.


  • Thanks but doesn’t seem to work, 1st link 403, 2nd link no play button (and download is audio only), 3rd link loads but never plays, 4th link doesn’t play at all and download doesn’t work. Again I appreciate alternatives but IMHO sharing YouTube links, so BigTech links, on Lemmy isn’t great. We should rely on federated alternatives for videos too.

    Edit: I did disable JS Shelter just for this (because of Anubis, ironically enough based on the video content!) but it still didn’t work. So to be honest even if it did work (which it didn’t) it would still not be great.