This article is focused on reading them electrically.
I too have heard you can read flash storage with electron microscopes.
This article is focused on reading them electrically.
I too have heard you can read flash storage with electron microscopes.
How is the hammer supposed to help me memorize the key?
do you mean github or do you actually mean git?
md5 for example is already vulnerable. People have figured out how to manipulate data into having a pre-specified hash. Meaning someone could engineer deliberate hash collisions and serve you any file they like.
SHA-256 doesn't (i think) have this issue, so far hah.
you have to fucking hope no one figures out how to backwards engineer the hashing algorithm you choose
precisely, which is why they cannot lie, just respond with no real grasp of wether what they output is truth or falsehoods.
everything is semantics.
Lying is telling a falsehood intentionally
LLM's clearly lack the prerequisite intentionality
not really no. They are statistical models that use heuristics to output what is most likely to follow the input you give it
They are in essence mimicking their training data
oh i didnt mean as in making a replacement, i meant as in getting one in Ukraine's hands
THIS is what it took to replace starlink...
Oh, i don't prefer using it anyway, it got served with it already in.
ah, smart!