Jump to content

colonel_mortis

Administrator
  • Posts

    4,012
  • Joined

  • Last visited

Everything posted by colonel_mortis

  1. colonel_mortis

    Forum signatures are crawled by chatGPT/Microso…

    Microsoft Copilot just performs searches using Bing, it's not making much use of the built in knowledge from training. It is entirely possible that the forum was scraped and fed into a pile of linear algebra an LLM, but this isn't evidence of that.
  2. It is meant to work even when the topic is scheduled to be posted later, but there might be some edge cases. I'll look into it.
  3. colonel_mortis

    Anyone ever hired a professional cuddler? I'm t…

    (For the avoidance of doubt, you can discuss this here, though I'd prefer if you avoid actually linking to any actual services. Replies containing "Escort" will trigger our spam filter and get held up for mod approval - they should get approved pretty quickly, but you might want to use a euphemism or misspelling to avoid that.)
  4. Yes, they are taken into account, but have less weight (and it decreases the longer it's been).
  5. Your attachment storage is not full, there is no limit. Your screenshots are unreasonably large though (the two that you uploaded to that post were 17MB each, whereas a normal screenshot would be <1MB), and there is a 20MB per post limit, so it's possible that you're just trying to upload another unreasonably large image.
  6. Did you see them in the editor when you were creating your topic, or only after submitting it?
  7. Something did change yesterday. It will change back at some point, hopefully soon. That error will occur if cloudflare wants to challenge you during the edit submission.
  8. It should only happen one every few hours, but yes this is expected.
  9. Back in September 2015, the forum was breached. At the time, everyone was notified (via email, as well as discussion on either the wan show or the wan aftershow), and everyone's passwords were reset. We are looking into this further, but the initial indications are that this is just the data from that breach finally surfacing publicly. If anyone has data to suggest otherwise (eg accounts created after that date), please do let me know.
  10. Ah damn I missed that part :/. It looks like that approach can still work though
  11. If you don't actually care about a programmatic solution and just want the answer, wolfram alpha can do that for you - you can just ask for the next composite number after 7,500,000,000, then for the factorisation of that. In a spoiler just in case you were looking to find the solution yourself:
  12. Summary Several paragraphs of text have been decoded from the inside of a scroll that was buried during the eruption of Mount Vesuvius in AD 79. These scrolls were too fragile to physically unroll, so researchers took high resolution CT scans of the scrolls, and released the data to the public, promising $700,000 to the first team to decode 4 passages from the inside of the scroll, based on the scan (along with a number of other prizes along the way), before the end of 2023. Quotes My thoughts This is an achievement that could only have been done with machine learning, and the technical feat here can't be understated. It has taken a lot of work to get this far, it's incredible to see what the community can achieve when it's given a goal like this. The $1M+ prize pool (donated by various mostly rich people) certainly helped to incentivise people to participate, and it will be interesting to see if this model gets adopted for any other projects in the future. If they are able to achieve their goal of extending this technology to read all 800 scrolls, this will be a big breakthrough in our understanding of Ancient Rome, let alone the other potential places where this technology could be used. Sources Official announcement: https://scrollprize.org/grandprize
  13. If you refresh the page again, it works again. I believe this is related to a few other bugs around how browser history is managed. It looks like this may have been fixed by the latest forum software update though (but no ETA yet on when that will arrive here).
  14. We won't talk about specific cases, as you know. In general though, it is not against the rules to be wrong, but we don't want people to be constantly posting things that are misinformation/misleading/misguiding, and would want to address it.
  15. If it's excessive then feel free to report it, we generally do ask users to stop doing that. Usually it's just a difference of expectations, especially for users who are used to discord style messaging.
  16. There isn't a rule against helping someone that you think has committed piracy, just rules against helping with piracy itself. If the issue they're having is because they pirated it, they shouldn't get help, but otherwise helping is fine (but you are of course free to choose not to help in that case).
  17. You were second on most reports, but there's quite a gap between your 365 reports and the 538 from @Levent
  18. Here's a look at some stats about the forum from 2023. Most of the dimensions here are similar to the dimensions from 2022's stats, but they may not be directly comparable because the methodology may have shifted slightly. Posts Topics Started: 64,866 Posts: 516,203 Controversy dominates the most active topics in 2023 (by num posts): Gamers Nexus alleges LMG has insufficient ethics and integrity - 9,333 posts Madison reveals experiences working at LMG - 4,292 posts LTT Official Folding Month VI - 2,713 posts (just 79 fewer than 2022's folding month) Linus Tech Tips, Tech Quickie, Tech Linked channels hacked - 2,067 posts What do we do now? - 1,928 posts Most active users: @filpo - 8,163 posts (far ahead of the 6,074 posts from last year's leader) @SorryBella - 5,934 posts @jaslion - 5,925 posts Last year's leader, @RONOTHAN## - 4,817 posts @Hinjima - 4,417 posts Most active users in Troubleshooting: @Robchil - 1,612 posts @191x7 - 1,602 posts @Whatisthis - 1,231 posts @Sawa Takahashi - 829 posts @Bjoolz - 756 posts Most best answers: @RONOTHAN## - 517 solutions @filpo - 484 solutions @Hinjima - 363 solutions @SorryBella - 251 solutions @jaslion - 224 solutions Reactions Reactions given: 242,962 Top reacters (most reactions given): @Needfuldoer - 7,997 reactions @da na - 6,089 reactions @soldier_ph - 5,739 reactions @Lightwreather JfromN - 5,386 reactions @SorryBella - 5,115 reactions Most reacted to: @da na - 6,606 reactions @GOTSpectrum - 4,676 reactions @Levent - 3,654 reactions @RONOTHAN## - 3,297 reactions @SorryBella - 3,073 reactions Most reacted to, excluding status updates and Off Topic: @RONOTHAN## - 3,289 reactions @jaslion - 2,903 reactions @GOTSpectrum - 2,729 reactions @filpo - 2,611 reactions @leadeater - 2,431 reactions Moderation Spammers banned: 14,534, of which approximately 13,555 were caught by our spam filters before posting any spam publicly. Reports: 7,155 Once again, @Levent submitted the most reports, at 538.
  19. I think the important part is how the different factors can be compromised. Something you know can be compromised by a keylogger, shoulder surfing, etc Something you have can be physically stolen Something you are can be captured in various ways (but can take more effort to fake) So if someone stole your bag, they could get all your "have" factors. Obviously there is a non-negligible increase in security from having multiple "have" factors, but once your threat model is high enough that you want 3 factors, you probably want them fully orthogonal. (This is most severe with multiple things you know, because lots of things that can steal one will steal both, but I believe still true for things you have and are.) On the point about someone that gets into your PW manager already having access to your Google authenticator, that assumes they log in through the front door. It's also possible that they accessed your password manager via malware on your computer, or by compromising any cloud copies of the vault (which should be encrypted with something derived from your password, but cannot be encrypted from something derived from the Google authenticator codes because they are dynamic).
  20. That's not how security factors work - the 3 available factors are something you know (a password or pin), something you have (an authenticator app, phone, or Fido key), and something you are (fingerprint, voice print, face, etc). I don't know of any password managers (or any services for that matter) that require all 3. If your password manager requires a password, Fido key and approval from an existing device, that's two factors (know, have, have). That being said, I don't store any "things you have" credentials (ie totp 2fa tokens or passkeys) in my password manager, because that does leave it as a single point of failure that bypasses all of the factors.
  21. colonel_mortis

    Good day sir! I was wondering if there will be…

    I expect so, but no promises (and especially no promises when it might come out)
  22. If you don't remember the moderator involved, feel free to send me a PM instead.
  23. Can you PM me a couple of examples that you find egregious and would want to be disallowed? In the mean time, you can ignore individual members' signatures using the x button on the signature. There's no hard rules here, but generally the threshold we're looking at is whether others are likely to be offended or otherwise unhappy with it. The words matter here (heckin' etc are fine, an offensive swear word in another language or region not), but also the context (using a word to describe a person is quite different to an unambiguously bad event) and frequency (one f-bomb can be ok in some contexts, but using it every other word is probably not). I don't have any formulae to give you, but as long as you're not totally unreasonably, you will probably be fine, and we'll give you a heads up if not.
  24. We don't generally pin topics like that, but feel free to start a topic for it and kick off the discussion. I'm not aware of an existing topic about that, at least not one that gained significant traction.
×