cypherpunks

joined 4 years ago
MODERATOR OF
[–] cypherpunks@lemmy.ml 16 points 19 hours ago* (last edited 19 hours ago) (1 children)

You're correct on both points (🤦‍♂️ indeed).

I've now edited this post to link to their advisory text file instead of their advertising-heavy blog post about it which I had initially linked when the above comment was posted. Thanks.

[–] cypherpunks@lemmy.ml 7 points 1 day ago (1 children)

Snippet here; can’t find a scan of the entire article.

I went digging and found it, it's split across two pages (which was the style at the time) here and here.

here is the full text to save you a click:

The Golden Age of the Internet

06.21.06

By John C. Dvorak

How many people realize that we're living in a golden age, the Golden Age of the Internet? It won't last; golden ages never do. Some of it will remain, but there's evidence that much of it is headed for the trash heap of history.

[ADVERTISEMENT]

Radio days. The golden age of radio lasted from about 1930 to 1950. It was nothing like radio today. Money was thrown at it. Thousands of great dramas and variety shows were made. Huge news organizations were built. Today, radio consists of right­wingers ranting about liberals, psychologists analyzing moaners-and-groaners, and mediocre music from CDs. We do get all-news stations with erroneous traffic reports, and public broadcasting stations with thoughtful shows on fascinating topics like the art of Gebel Barkel from the first millennium BC.

Every new technology that widely affects society has a golden age, and we give things a lot of slack. Porn on the Net symbolizes this leeway. But so do podcasting, blogging, free video servers, chat rooms, P2P, free e-mail, and other flourishing services.

A proprietary, closed Net is coming. A golden age ends either when something new comes along (as with radio's golden age, killed by the advent of TV), the government gets involved, or entropy sets in—usually a mix of these elements. In the case of the Internet, we are already seeing a combination of government, carrier, and business interactions that will eventually turn the Net into a restricted and somewhat proprietary network, with much of its content restricted or blocked. Only a diligent few will actually have access to the restricted data, and in some parts of the world even trying to view the restricted information on the Net will be a crime.

It's already a crime to post intellectual discussions about copy-protection schemes that are protected by the DMCA. If the American public tolerates that sort of onerous restriction, then it will tolerate anything.

Continue reading... (page 2)

Filtering and blacklists now common. Most U.S. government agencies now use filtering mechanisms to keep their own computers from accessing blacklisted Web sites. Third parties maintain these blacklists, and they put whatever they want on the lists. For example, my blog was blacklisted for a while, with no explanation.

[ADVERTISEMENT]

Most companies go much further and carefully monitor all network traffic. They can then pinpoint the use of streaming media and other verboten uses of corporate computers and simply block such usages and blacklist the sites involved.

Even e-mail is lost in the shuffle. The New York Times has a system in place that prevents certain press releases from getting to the reporters.

Blame spam and porn. Spam, porn, and other forms of questionable content are the reasons for filtering and blacklisting. But increasingly, content that mentions birth control or evolution is blocked. Nazi memorabilia sales and hate sites are also banned. It is folly to think that any government, no matter how progressive, won't be tempted to choke off certain content of which it does not approve.

This sort of intervention becomes ever easier with the consolidation of the Internet. It's all headed to AT&T; and Comcast. AT&T; has already sold the public down the river by turning over phone records to the government without blinking an eye. Ask it to filter Google results? No problemo!

Is there anything the public can do about this? Yes—enjoy the Golden Age, while you can.

Discuss this article in the forums.

More articles from John Dvorak:

See John get cranky about technology in his new Cranky Geeks IPTV Show.

Go off-topic with John C. Dvorak here.

[–] cypherpunks@lemmy.ml 1 points 2 days ago

FYI, the day after you published this blog post, a spam blog posted... their AI reimplementation of it 🤦

details:here is a snapshot of (maybe?) the "original" slop post borrowing from your title; i first saw it reposted on this slightly-more-credible-looking (at least if you haven't seen it in previous search results and already realized it is spam) page:

screenshot of dev dot to spam site

i tried to archive it, to avoid linking to a spam site from this comment, but it crashes archive.org's browser:

archive.org screenshot showing error message saying their browser crashed

i also was curious to see if this spam is in search engines, so i searched for AI reimplementation, and... well, the good news is that your blog post is the first hit and the above-linked spam blog is pretty far down in the results list.

The bad news is that the second hit is to yet another piece of slop/spam evidently also "inspired" by your post:

duckduckgo screenshot

[–] cypherpunks@lemmy.ml 19 points 5 days ago (8 children)
[–] cypherpunks@lemmy.ml 3 points 5 days ago* (last edited 5 days ago) (1 children)

Nice post. Relatedly, see also malus.sh and this talk by the people that made it (both of which I posted in this lemmy community here).

A couple of minor corrections to your text:

Blanchard's account is that he never looked at the existing source code directly.

Blanchard doesn't say that he never looked at the existing code; on the contrary, he has been the maintainer (and primary contributor) to it for over a decade so he is probably the person who is most familiar with the pre-Claude version's implementation details. Rather, he says that he didn't prompt Claude with the source code while reimplementing it. iirc he does not acknowledge that it is extremely likely that multiple prior versions of it were included in Claude's training corpus (which is non-public, so this can only be conclusively verified easily by Anthropic).

The GPL's conditions are triggered only by distribution. If you distribute modified code, or offer it as a networked service, you must make the source available under the same terms.

The GPL does not require you to offer GPL-licensed source code when using the program to provide a network service; because it is solely a copyright license, the GPL's obligations are only triggered by distribution. (It's the AGPL which goes beyond copyright and imposes these obligations on people running a program as a network service...)

 

via https://www.nokia.com/bell-labs/about/dennis-m-ritchie/picture.html :

An amusing photo

Here's a publicity photo from about 1972, showing Ken and me in front of a PDP-11.

From the right, the major items of equipment are

  • At the far right, on the table, are what someone discerned was a VT01A storage-tube display (based on Tek 611) and a small keyboard for it. Slightly hard to make out.
  • A main CPU cabinet, partly behind the table. The processor is a PDP-11/20; it must have been our second one, with the Digital Special Systems KS-11 memory management unit. Our very first just said "PDP11," not "11/20." The arrays of distorted rectangles above it and in other cabinets are the labels on DECtape canisters.
  • Another cabinet. Careful examination of the image by Steve Westin detects the top of the bezel of an 11/45 CPU barely peeking above the TTY to the right of the one Ken is typing at. A paper tape reader is above it.
  • The third cabinet sports a dual DECtape drive at the top.
  • A cabinet with another DECtape drive, probably also containing BA-11 extension boxes within.
  • A cabinet with RK03 disk drives. These were made by Diablo (subsumed by Xerox) and OEMed to Digital. Digital later began manufacturing their own version (RK05).
  • A cabinet containing RF11/RS11 controller and fixed-head disks. By this time / and swap space lived there, while /usr was on the RK03s.
  • On top of the machine are what look like magtapes. A probable TU10 transport is barely visible just below Ken's chin, at least if you have the monitor brightness and contrast adjusted favorably.

In front, we have

  • Ken (sitting) and me (standing), both with more luxuriant and darker hair than we have now.
  • Scientific American March 1999 p. 48 should have checked the IDs; we're interchanged in its caption of this same picture.
  • Two Teletype 33 terminals

If you want a giant (2.1 MB) JPEG version at higher resolution, click here.

More pictures of PDP-11 equipment are available in John Holden's collection.

[–] cypherpunks@lemmy.ml 7 points 5 days ago

tbh, no, i have never actually used QED. 😢

(i have used ed though...)

[–] cypherpunks@lemmy.ml 1 points 6 days ago (1 children)

ai;dri'm kidding in this case; i actually did read your comment.

but, more and more frequently i do find myself stopping reading something due to suspecting (broadly speaking, because of the "quality of the content") that it is likely to be LLM output.

[–] cypherpunks@lemmy.ml 2 points 6 days ago

to be fair, there is a space in the name in this meme.

maybe it's actually referring to one of the many replicas? 🤔

[–] cypherpunks@lemmy.ml 22 points 6 days ago* (last edited 6 days ago)
[–] cypherpunks@lemmy.ml 16 points 6 days ago (3 children)

you posted this three weeks early

view more: next ›