The object of a system of authority is order, not justice. Justice matters only after injustice sufficiently compromises order.

  • 0 Posts
  • 21 Comments
Joined 3 years ago
cake
Cake day: August 8th, 2023

help-circle
  • This is a fast path to open source irrelevancy, since the US copyright office has deemed LLM outputs to be uncopyrightable.

    This is a misunderstanding of US Copyright. Here’s a link to the compendium so you can verify for yourself.

    Section 313 says “Although uncopyrightable material, by definition, is not eligible for copyright protection, the Office may register a work that contains uncopyrightable material, provided that the work as a whole contains other material that qualifies as an original work of authorship…”

    This means that LLM created code that’s embedded in a larger work may be registered.

    Section 313.2 says “Similarly, the Office will not register works produced by a machine or mere mechanical process that operates randomly or automatically without any creative input or intervention from a human author.”

    Meaning that LLM created code CAN be registered as long as an author has some creative input or intervention in the process. I’d posit that herding an LLM system to create the code definitely qualifies as “creative input or intervention”. If someone feels it isn’t then all they need to do is change something, literally anything, and suddenly it becomes a derivative work of an uncopyrighted source and the derivative can then be registered (to a human) and be subject to copyright.

    In short, it’s fine. Take a breath.




  • The term VPN is pure marketing bs. What is called VPN today used to be called Proxy Server.

    Perhaps if you are only talking about the consumer level stuff advertised on TV. Otherwise I can assure you that “Virtual Private Networks” are a real thing that have absolutely nothing to do with Proxy Servers.

    On down the comment chain you mention "…our computers would not see each other and would not be able to connect to each other via that service. " as some kind of test of whether a thing is a VPN or Proxy Service but what you’re missing is that this is a completely common and advisable configuration for companies. In fact Zero Trust essentially demands configurations like this. When Bob from Marketing fires up his VPN to the Corporate Office he doesn’t need access to every server and desktop there nor does his laptop need to be able to access the laptops of other VPN users. They get access to what they need and nothing more.

    Hell the ability to access the internet via the tunnel, called Split Tunneling, is also controllable.

    It’s that ability to control where the tunnel terminates that allows consumer VPNs, like Proton, to be used the way they are.

    So while private individuals absolutely do use VPNs as an ersatz replacement for Proxy Servers they are nowhere near the whole use case for VPNs.



  • For example, I’ve noticed that some websites start throwing captchas at me or even just straight-up refuse to load with 403: unauthorized errors because I have my router set up to load-balance across two Internet connections. (At least, that’s my guess as to why it’s happening.)

    I maintain several multi-wan commercial setups and they don’t have this problem. I obviously don’t know what your setup is but I’d guess something is wrong with how its handling flows / connections. Once a connection is established between your edge and an internet resource that flow should remain “stuck” to whatever wan port it started with and it sounds like that isn’t happening.






  • Could be that they are taking a loss on the initial units in order to get going. Once the campaign backers are taken care the product is commercialized and then the price goes up. I’ve seen more than one Kickstart campaign used to launch a company in just this way. (Tempest PWS is another example).

    Anyway they aren’t vaporware. I backed the campaign and received my units today.