Hacker Newsnew | past | comments | ask | show | jobs | submit | ilovefood's commentslogin

Super cool and well done. They are much better in 3D! :)

I made a similar experiment a while ago and randomized the parameters. Given it's difficult to stumble on a stable arrangement, I turned it into a small game to find pretty ones: (big disclaimer: this involves NFT tech, please skip if you're against that sort of stuff) https://karimjedda.com/symmetry-in-chaos-my-first-generative...


Sharing a small experiment that somewhat attracted a lot of attention yesterday, perhaps you'll like it too.

Thesis: Many devices or apps listen in while not in use. We're assured these only do topic matching (ie: identifying keywords) but who knows.

Observation: Today, generative AI can be used to generate a bunch of things, text, code, video but also audio. So why not bid local algorithms against remote algorithms?

Solution: I put my phones in a metal box i'm dubbing "Gaslight Garage", where a speaker plays randomly generated Elevenlabs audio to the phones. The pipeline is fully automated and sometimes hilarious. While white noise generators and other things are detectable, I believe this is much more difficult to detect on-device.

I've yet to see the results but maybe it'll give the one or the other a few ideas. This is pretty much in line with my local LLM extensions (on my blog) to use local-AIs as countermeasures against remote AIs, they love data, right?

Enjoy your Sunday!


Great write-up! Gives me a few ideas for a governance bot that I'm working on. Thanks for sharing :)


Same problem here :)


I fully agree. It's difficult though because I genuinely believe that the solution space overlaps with cryptography, which is quickly discounted as viable option because it is now laden with negative connotations.


Cryptography has negative connotations? Like what? Do you mean cryptocurrency by any chance? (If so, it's feasible to practice cryptography without touching cryptocurrency).


Not op, but in my bubble:

- DRM. - Owner-unfriendly device locks (such as manufacturer-controlled secure boot or locked-down OSes). - Inability to audit network traffic from one's own devices, i.e. an IoT device. - Remote attestation, when in opposition to open computing.

I could also see folks seeing the use of cryptography as "having something to hide" - I don't personally agree.


DRM, device locks and remote attestation are hate-worthy uses of cryptography. But don't you think that crypto has far more well known and beneficial uses? I have a hunch that even a layperson will understand the implications if anybody decided to ban E2EE or secure messengers. Not to mention the fact that the solutions for those clandestine uses are also based on crypto and reverse engineering.

If I correctly understand your point, you're highlighting the importance of perceptions. But I was under the impression that crypto is perceived as good in spite of its unpleasant applications.


nah. cryptography is not seriously held back by cryptocurrency


Fair point and it's still a domain of research. The GNU project works on something quite cool I think, called Anastasis. If we solve these things & make them easy, it's a win.


Vault doesn't use emails, usernames or anything like that. It's just shared as an example of a signer. It doesn't have to be that app per se, but it's the closest example I know of.


I can’t tell, I don’t spend too much time on LinkedIn. What makes it feel that way to you?


Whatever option gets us closer to portable and less centralized digital identity, data and payment is a win in my book.


You're 100% right, it's about trust or lack thereof. Thank you for the Star Trek references. :D


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: