A robust alternative to 2FA has to take into account three super common scenarios:
- you are in a foreign city and have been mugged, your wallet and phone have been stolen from you
- you have dropped your keys down the drain
- you are homeless, your phone has just died, and your only computer is a public access library computer running Internet Explorer 6. you are not able to afford a monthly subscription to Bitwarden
@reidrac@social.sdf.org It is almost the time to get really *roasted* !
@mike So, the push into more recent PCIe versions makes sense. If you can't have bandwidth for 2x16, you can achive that on 2x8 and double the base lane speed 🤔
OTOH it may be more efficient to put up a dedicated box that will have all the available BW for itself.
@boilingsteam Neat. I'm glad I haven't bought version ~~1~~ 0 stuff.
@toolbear @pineforest Seriously, dude. That was lame.
@FeralRobots Whatever the FUCK the tags has to do with the rich guy's toys?
@dpiponi @uwedeportivo @rms80 @flaviusb Fake it till you make it 😅
@suppi@fosstodon.org @reidrac@social.sdf.org On a more serious note, this very important indeed.
Experts are at least in part formed by the existing deficiencies in the ecosystem. Newcomer's wtfs should be noted and addressed for gradual raising of the language usability waterline.
With games being CrossFit of programming, touching lots of aspects, we have an opportunity to make lots of things better, fast.
@rms80 @flaviusb @dpiponi Does it matter, though? There's no "fake addition" that brings you the same results in arithmetic, but without the "real math" behind it. The addition that works is just... addition. Ditto for every other task.
If the next token batch is merely predicted to be some bytes from Metasploit payload your system would be pwned.
@dpiponi It doesn't stop with association though. For some tasks it has pretty strong causal model. I.e. you can test interventions and counterfactuals on it.
Toots as he pleases.