• 2 Posts
  • 90 Comments
Joined 2 years ago
cake
Cake day: November 16th, 2023

help-circle




  • JPAKx4@lemmy.blahaj.zonetocats@lemmy.worldHow on earth?
    link
    fedilink
    arrow-up
    34
    arrow-down
    2
    ·
    1 month ago

    The fact that several species in Australia are now extinct kinda shows cats do harm bird populations. Cats are usually an invasive species and hundreds of them in an area can decimate local wildlife. Overcrowding only kill birds when there are too many, while cats will always kill birds. There are definitely places where it matters more, like on small islands, but in general any invasive species can massively shift ecosystems.








  • Every time you ask something to an LLM it’s random, and the randomness is controlled by what is called temperature. Good feeling responses come from LLMs with moderate temperature values, including chatgpt. This means putting the prompt in and getting a different response is expected, and can’t disprove the response another person got.

    Additionally, people are commonly creating there own “therapist” or “friend” from these LLMs by teaching them to respond in certain ways, such as being more personalized and encouraging instead of being correct. This can lead to a feedback loop with mentally ill people that can be quite scary, and it’s possible that even if a fresh chatgpt chat doesn’t give a bad response it’s still capable of these kinds of responses


  • I’ll share my experience with my very unprofessional but working setup.

    I have two locations, both using retired PCs. I don’t need anything fancy, but some considerations could be GPU/encoding hardware if you wanted something like jellyfin/Plex. I use proxmox and proxmox backup server for managing everything and so far it’s been working well. Definitely not plug and play like an aio nas but that’s because a nas wasn’t my only goal as I needed cameras (frigate) and homeassistant.

    I would highly recommend headscale/tailscale (as others have suggested) as it “just works” when setup in my experience. This enables safe remote access without opening any ports on your families networks so you can troubleshoot if something did break.

    Regardless of which solution you decide to use, the most important part about having a backup is testing. If you can’t see when your backups fail or don’t know how to recover you may as well not have a backup.


  • Nobody, and I mean NOBODY with any amount of psychology education actually think Freud was right on anything. He was the biggest pseudoscientist of all time.

    See https://en.wikipedia.org/wiki/Oedipus_complex#Criticism

    Studies conducted of children’s attitudes to parents at the oedipal stage do not demonstrate the shifts in positive feelings that are predicted by the theory.[54] Case studies that Freud relied upon, such as the case of Little Hans, could not be verified through research or experimentation on a larger population.[55] Adolf Grünbaum argues that the type of evidence Freud and his followers used, the clinical productions of patients during analytic treatment, by their nature cannot provide cogent observational support for Freud’s core hypotheses.[56]

    Evolutionary psychologists Martin Daly and Margo Wilson, in their 1988 book Homicide, argue that the Oedipus complex theory yields few testable predictions. They find no evidence of the Oedipus complex in people. There is evidence of parent–child conflict but it is not for sexual possession of the opposite sex-parent.[57]

    According to psychiatrist Jeffrey Lieberman, Freud and his followers resisted subjecting his theories, including the Oedipus theory, to scientific testing and verification.[58] Lieberman claims that investigations based in cognitive psychology either contradict or fail to support Freud’s ideas.[58]






  • That is the correct way of thinking, never trust anything with your passwords.

    I was curious on what haveibeenpwned does, so I took a look at what the network tab in dev tools said what was actually sent. When I type a password (say password123) and press check it runs a function that hashes with the “SHA-1” hash function and then sends the first 5 characters of the result. The response is over a thousand lines in the format of 35 hash characters:number of breaches

    If any of these hashes are the start of your original hash, you now know it’s exposed and how many times it’s been exposed.