Hacker Newsnew | past | comments | ask | show | jobs | submit | teh_infallible's commentslogin

It basically writes a bunch of notes as markdown files and then injects them as part of its prompts. I saw someone compare it to that movie Momento, where the protagonist can’t form new memories so he tattoos notes all over his body.

That sounds like a good comparison.

It seems odd to me that the military doesn’t already have far superior models.

Can you get Zulip supported by OpenClaw? Zulip was my first choice communication channel.


https://github.com/openclaw/openclaw/discussions/5163 suggests it already has a PR.

I'm told (https://chat.zulip.org/#narrow/channel/127-integrations/topi...) that upvoting that discussion might help it get prioritized.


Apparently they use smart appliances to scrape websites from residential accounts.


Anarchy is not a rejection of hierarchies, it’s a rejection of a central authority.


I guess it comes down to definitions again.

If you look at what people do for fun, they often create hierarchy and even central authority. They formally or informally elect a leader to their football team, who calls plays and helps with coordinating.

It's just that no one can really force anyone else to stay in that club.


Or you could see it as an argument for the second amendment. Would someone have attempted this against an executive based in Texas? I don’t think so.


It has already happened in Texas:

https://archive.is/34qpX


In headlines "FBI Busts Plot to Kidnap Miami Jeweler and Steal $2 Million in Crypto"

That seemed to rely more on good policing than the second amendment.


I’m a big 2A supporter but would still want the would-be kidnapper to be deterred by other means. I can be incapacitated or caught unaware, JP Morgan and Charles Schwab cannot.


Maybe they wanted to decrypt NATO radio messages?


being part of NATO, can't they just get a copy of the keys from somebody? or is it a case of "they might turn on us, better keep an ace"?


Seems less likely to happen than, well, what we have now. Russia has a lot of good mathematicians btw.


NATO Keys are distributed to every NATO member through distribution agencies. A good chunk of them (and the algorithms and cipher equipment) are produced by the US and shared (with some limitations) with NATO. I don't know the scope of algorithm sharing but I believe there are some limitations for NATO access to US-shared algorithms.

It's probably a case of 'nobody cares too much'. The standardization process is very long and the industry probably had already put them into their equipments.

ALE is not used that much and from what I can gather manual frequency establishment is often preferred. I'm not sure what the actual operational impact of this DoS would be, and if some spoofing is possible, but the actual communication is encrypted by different protocols depending on the type of comms (RATT, IP-like, Voice) so actually deciphering comms wouldn't be possible.

See Jerry Proc's website (https://jproc.ca/crypto/) for background knowledge.


The first step in being discrete is being discrete.

That is to say, if you want to crack NATO communiques your first step is to not call them up and ask for the goods.

Whether this is ethically good or not is tangential and an exercise left to each reader.


This was the original vision for iPhone, if I’m not mistaken


I use a short throw projector with an Apple TV. There’s also a little device called Micca which you can use to play video files you’ve downloaded.


Get a short throw projector. You can plug anything into it. It’s the perfect “dumb” screen.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: