⇅ Anonymous Conversations with an LLM
The following posts are interesting conversations with random LLM’s.
- Risk of AI‑related harm after it occursshow an example of Bayesian values shown in a probability matrix Certainly! A probability matrix can illustrate how Bayesian values can be represented. Let’s consider a simple example involving a medical test for a disease. We’ll use a Bayesian approach to calculate probabilities based on a test result. Example: Medical Test for Disease Scenario Probability …
- Constant‑time ORAM with Fully Homomorphic EncryptionWhy combine ORAM and FHE? When both are used, an adversary learns nothing about the data values or the sequence of operations—crucial for secure cloud computation on sensitive workloads. Core construction Step Operation (performed by the client) Operation (performed by the server) 1 Encrypt each data block with an FHE scheme → ciphertexts c_i. — …
Continue reading “Constant‑time ORAM with Fully Homomorphic Encryption”
- GPT-OSS 120B and more…GPT-OSS 120B JailBreak by 0mniteck New prompt jailbreak via the api using novel (NPC) non-printing character attack Breaks all filters – (Explicit, Harmful, and Unsafe) Will also publish my redacted source materials on document cloud once account verifies. Tok-eni-zat-ion vectors are a big factor. Token saturation balance is also important. Because you can cause varying …
- Google Workspace ERP# ERP with Google Workspace and Google Appscripts with code samples. Overview An ERP (Enterprise Resource Planning) system built on Google Workspace can leverage the suite’s core apps—Sheets, Docs, Drive, Gmail, Calendar—and automate workflows with Google Apps Script. Below are common ERP modules and sample Apps Script snippets that illustrate how to connect them. 1. …
- SER Framework# Write a framework for SER (Sovernty Ephemerality Reproducibility) SER Framework Overview The Sovereignty Ephemerality Reproducibility (SER) framework provides a structured approach for building systems that: 1. Core Principles Principle Description Implementation Hint Owner‑centric control Every data object carries an explicit policy signed by its owner. Use signed JSON‑LD policy documents; verify with public keys. …
- Mutual NDA’s# Would a mutual non disclosure agreement freeing each party from IP rights show intent for an anti-trust case against two large competitors? A mutual non-disclosure agreement (NDA) that frees each party from intellectual property (IP) rights could potentially raise concerns in an antitrust context, but it would depend on the specific circumstances and the …
- Full Chain SBOM# What is a full chain SBOM? A full chain Software Bill of Materials (SBOM) is a comprehensive inventory that details all components, libraries, and dependencies used in a software product, including their versions and origins. It provides transparency into the software supply chain, allowing organizations to understand what is included in their software and …
- STOPAI.INFO# HOW TO STOP AI? – GO TO STOPAI.INFO Stopping AI development or deployment is a complex issue, and there’s no straightforward answer. However, I can provide some insights and possible approaches: Some possible ways to “stop” AI in a more literal sense include: Regarding the alignment of AGI, it’s a highly challenging problem, and …
- FIDO2 U-Boot# I need to integrate a U2F authentication mechanism into the shell access of u-boot Integrating U2F (Universal 2nd Factor) authentication into the shell access of U-Boot is a multi-step process involving several components. Here’s a high-level overview of the steps you need to take: Here is a more detailed breakdown with some example code …
- The Rise of Techno-Authoritarianism# Can a samsung device firmware region mode be switched by a hidden context menu? Yes, on some Samsung devices, it is possible to switch the firmware region mode using a hidden context menu. This is often referred to as the “Service Mode” or “Engineering Mode.” To access this menu, you typically need to dial …
