Hacker Newsnew | past | comments | ask | show | jobs | submit | nlightcho's commentslogin

Make sure you are using the instruction tuned model. The base model will be difficult to prompt.

It works in 8-bit with about 12GB of VRAM usage. Here's sample code:

https://gist.github.com/AlexanderDzhoganov/a1d1ebdb018e2e573...


What about running it as a sidecar in the backend pods?


This causes some other problems... Kubernetes doesn't do a very good job of treating the sidecar as part of the main container so you will get random disconnects in your app when the proxy is restarted unexpectedly. This is actually why we abandoned it, just to deal with the random hiccups. Hadn't even benchmarked it.


I agree with your argument on principle but cheating in multiplayer games is a real problem and for now kernel level anti-cheat is pretty much necessary until better methods are developed like server-side ML detection. For what it's worth anti-cheat software is routinely disassembled by cheat developers so at the very least it doesn't do anything obviously malicious and likely doesn't have glaring security issues (any of which would get immediately exploited by said cheat developers).


If your game company “pretty much requires” you to install “anti cheat kernel modules” on my machine, unless you’re supplying that machine to me as part of my game purchase price exclusively to play your game with, you can just go broke thanks. Flawed business models do not give you the right to break into and exploit my hardware.


So what if it's a problem? Are these game companies entitled to stop cheating by any means necessary? No. It's my computer and game companies have no right to tell me what I can or can't do with it.

If I want to cheat at their game, that's my right. The game is running on my computer and I should be able to modify anything I want whenever I want. Cheating at games is just an exercise in computer freedom. It shouldn't be prohibited to begin with as a matter of principle.

I actually have little interest in cheating though. What happens often enough is these anti-cheat services will scan my processes, detect my development tools or virtual machines and label me a cheater because of them. Some games literally refuse to even start because of this. They also ensure a lack of Linux compatibility due to their proprietary Windows drivers.

> so at the very least it doesn't do anything obviously malicious and likely doesn't have glaring security issues

Remember capcom.sys?

https://mobile.twitter.com/TheWack0lian/status/7793978407622...


If it's an online game you cheating ruins the experience for other people who have their own rights and interests in a purchase they made. I still don't think it justifies a rootkit but it should be made clear that the impact of cheaters is often to the detriment of thousands of other people.


What's broken is the online gaming model. It's wrong to play with random untrusted people and expect to not find cheaters among them. Just like it's wrong to place a computer on the open internet and expect it to not be scanned, probed and possibly exploited by malicious actors.

The horrible truth these companies don't want to face is people should be playing only with trusted friends. This would destroy their "massive online game" model so of course they don't want to do it. They'd rather own your computer instead.


I don't want to play with just my friends, I as someone who's been playing online games for about 20 years, don't think the playing with many other people part is broken and that is very enjoyable. What's broken is often the choice of server architecture and decision to not have the right amount of moderators to handle reports.

Many games use either partly or entirely P2P decision resolution which is easier to game then purely server side. Then also the gaming industry has been downsizing and automating moderation for years now which means typically the companies with the largest online presence (looking at you ActiBlizzard) don't have enough actual moderators to handle reports and they resort to leaning more heavily on these grey area technologies to catch cheaters. It's fundamentally an issue with expense cutting imo.


There are other ways to attack cheating. Besides, trusting a remote system you don't control is a case study in Security Failures 101. It's about as likely to work in the long term as typical DRM schemes: it does create a barrier, and it will deter casual violation by most people for as long as that barrier holds, but if there's enough incentive then sooner or later someone who knows what they're doing will break the barrier, and then they might share that ability with everyone else anyway.


This is how UWP works and it's a UX disaster.


That looks like a grossly over engineered version of what I would like.

Sidenote: I've been a linux/Mac user for a few years now and recently had to work on stuff for the Windows side of things. All I can say is: wow. what a disaster. documentation is a complete nightmare and there seem to be 14 different versions of anything all fighting to do similar things. dead ends everywhere.


You should use a CSS reset stylesheet like https://github.com/necolas/normalize.css instead.


The cloud providers have enough resources to provide APIs that are compatible with the popular ones. They won't be selling you Mongo but a Mongo-compatible replacement built in house.


Yeah - but they need Mongo (or whatever) to a) exist, and b) be widely enough used to make it worth their while.

Amazon isn't in the business of creating and promoting new software to developers. Not in the way Mongo/Redis/Elastic are.

"Popular things" have to come from somewhere, and my optimistic side kinda hopes that _maybe_ these new "OSS unless you're a cloud provider" licenses will be a way to fund development of software too big and complex and ambitious that it won't ever get started as a "scratch your itch" project. I dunno if that'll pan out. But I'm glad someone is trying.


SegWit needs 95% to be activated, it's not even close.


uasf.co will try to force SegWit activation. And we'll see what'll happen, and will there be economic majority or not to force SegWit activation, and how many blocks [and transactions] will end up orphaned.


I would say Tor but rumor is the US gov have ways to break it.


I don't think that's some big secret or rumor. Tor has vulnerabilities, namely that it can effectively be de-anonymized by controlling n or n% exit nodes.


https://twitter.com/awscloud/status/836630468778864640

At least now we can see all the network failures in full RGB.


Working hours is a pretty arbitrary concept that depends on the business. Every hour is a working hour if you run a 24/7 store.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: