Debugging live #ActivityPub systems can be such a pain sometimes. Currently getting spammed by "Delete" events for random users whose public key can no longer be resolved via http signatures.
Excuse me but… why the chicken fried fuck can you stuff arbitrary WASM in a font?
It's reasonably easy in most image editing software (lightroom, capture one, etc) to embed all sorts of EXIF metadata in an image. (Eg, photographer name, copyright, etc).
It would be great if there were a standard set of attribute tags for embedding Alt (and Title) text that gets automatically interpreted by services (like Mastodon) you upload to, so you don't have to type captions and descriptions every time. It would be so much easier to have this just live in the image files themselves.
What you're refering to as the Torment Nexus, is in fact GNU/Torment Nexus, or as I've recently taken to calling it, GNU plus Torment Nexus. The Torment Nexus is not a man-made horror beyond comprehension unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full eldritch abomination as defined by POSIX.
You heard #Adobe. Deep down you knew this was coming. Now all your art are belong to them. Time to move on to better things...
Kreative Suite
* Krita is your new design/painting app
* Kdenlive will give you video-editing powers
* glaxnimate adds 2D vector animations to you videos
* digiKam organises your collection images
https://kde.org/for/creators/
Also:
* Inkscape - create sophisticated vector-graphic designs
* Scribus - layout like a pro
* GIMP - need we say more
* Blender - ditto
Really wanna work #LoRa into my daily carry. Maybe if I add some sort of sensor at home to talk to? Maybe a telegraph?
The 6th example I've seen of the same prompt injection attack against LLM chatbots: https://embracethered.com/blog/posts/2024/github-copilot-chat-prompt-injection-data-exfiltration/
The attack involves tricking an LLM chatbot with access to both private and untrusted data to embed a Markdown image with a URL to an attacker's server where that URL leaks private data extracted from the session.
We've now seen this same attack in ChatGPT itself, Google Bard, Writer.com, Amazon Q and Google NotebookLM (all now fixed, thankfully).
My collection: https://simonwillison.net/tags/markdownexfiltration/
Have you ever had an experience like, you're walking down the street, there's a piece of litter, and you kind of like, kick it by accident, your foot grazes it, and suddenly you feel a compulsion to pick it up and put it in a trash can? This is litter, it wasn't your problem, but then you accidentally touched it and it Became your problem, somehow the act of touching it tagged it as "yours" and now the superego says you're obligated to deal with it?
That's what open source contribution is like
If you see a new youTube channel with a plain sounding name like "NatureView" or "BrightScience" etc. and there is what looks like a tempting video on a specific education topic "Most Active Volcanoes" or "Incredible Carnivorous Plants"
There is a 50/50 chance it will be a generated voice with stock footage and a script written by GPT.
I am now avoiding videos if I don't recognize the creator, or don't see signs it was made by a person.
So much spam!
Believe it or not, there is still plenty of interesting and exciting work to talk about that doesn't involve LLMs.
Cryptographers contributing to the IETF is working to standardize FROST, a two-round threshold signature algorithm based on Schnorr proofs, which is backwards compatible with Ed25519.
This means it will soon be possible to generate Ed25519 signatures from, for example, 4-of-7 shares held by independent parties. And the verifier doesn't need to do anything different; it's just an Ed25519 signature to them.
That's cool as fuck.
There's little-to-no hype about it.
Occult Enby that's making local-first software with peer to peer protocols, mesh networks, and the web.
Exploring what a local-first cyberspace might look like in my spare time.