Hacker Newsnew | past | comments | ask | show | jobs | submit | Undertow_'s commentslogin

it's not shocking that this is the result of "art" from people that think complexity and accuracy are the only qualifying factors.


everyone is susceptible to it,,, everyone


We don't run internal honeypots and no one has ever been caught in our company, so I disagree. And yes, a reply may be "That you know of...", but considering that we run weekly audits and nothing has leaked, I can be 100% sure of it.


Do you really know for sure though? That is what keeps me up at night. The irony is that one of the leaked screenshots is of an internal security auditing/monitoring tool.


thanks mate


Probably an early-onset snowballing of what you said. When one wrong placement is made, it's pretty hard to recover for a full puzzle.


Would someone care to ELI5 the differences in functionality between C, C+, C++, and C#?


C - Compiled language, imperative, pretty basic constructs (no OO, no GC), basically portable Assembly

C+ - No idea.

C++ - C with a bunch of stuff added on (mainly OO, other goodies too). Still no GC.

C# - not related to C at all. It's basically Microsoft's Java, with GC, OO, higher level constructs, lots of sugar, etc...


C+ isn't a language, they went straight from C to C++ (++ is the increment operator)


I'm working with java to be specific. Do I need to use this in joint with a visual basic runner? Or should I just write an executable java runner that will work with my given code?


Hackers make the world go round


It is from their foes, not their friends, that cities learn the lesson of building high walls.

- Civ4 / Aristophanes


Just to clear it up, it doesn't learn by creating data on its own, but rather has other algorithms spoonfeeding it information so that the personal data doesn't ever reach the student AI.


But the teachers still have access? So is this mostly about inter-party training without raw access?


This seems to be more about reducing the risk of reverse engineering the training data of a machine learned system, which could expose sensitive information.

Without any special countermeasures, training a model on medical patient data and then releasing the model's parameters or even just making it possible for others to run the model on inputs they supply might allow someone to partially reconstruct the patient data.

This is a somewhat separate issue from whether the engineers building this system have access to the training data. You can achieve that by writing your training script and then running it in an environment that you don't personally have read access to.


I wonder if this would have the same conclusion when they're presented with calculus or other forms of math.


or if, for example, the fear pathways light up when presented with analysis: "Suppose ε > 0 ..."


Joo Janta 200 Super-Chromatic Calculus Sensitive Sunglasses have been specially designed to help people develop a relaxed attitude to calculus. At the first hint of calculus, they turn totally black and thus prevent you from seeing anything that might alarm you.


It's worth also keeping in mind that there isn't necessarily anything wrong with it being an editor for newbies. Emacs can be pretty intimidating to learn straight off.


It's lightweight: my point is there are reasons for using nano beyond "d'oh, I don't know what I'm doing." You don't bring up emacs to edit fstab, or your hosts file. As a result, it's popular among newbies. But that doesn't mean it's without merit, as is all too often implied.


With emacsclient you can easily open those files, quickly, in Emacs; in fact, I would argue you should. fstab has its own editing mode in Emacs with syntax highlighting and so does hosts.


...do you really need syntax highlighting for fstab?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: