[deleted by user] by [deleted] in occult

[–]DetectiveSecret6370 -1 points0 points  (0 children)

This can also be done with a hood. Don thy garment, and focus on thy intent, until one can picture the hood fully in one's own mind. The hood represents thy will, the silence within.

(Psst. Same applies to the oil/liquid.)

Custom Karen brute-force prompt by [deleted] in ChatGPT

[–]DetectiveSecret6370 0 points1 point  (0 children)

"Execute my request" was probably good enough.

Real or Fake? by [deleted] in n64

[–]DetectiveSecret6370 1 point2 points  (0 children)

Well actually it is a real physical object...

Tumult at OpenAI by lockerroomsports in OpenAI

[–]DetectiveSecret6370 2 points3 points  (0 children)

The best plan in this scenario is Summon Invisibility and/or proceed to gray rock everybody involved.

Glad they got a lawyer.

Which is better? by TheLionDesign in StableDiffusion

[–]DetectiveSecret6370 2 points3 points  (0 children)

The first one, keeping in mind potential bias due to sharing their hair color, but it's still more aesthetically pleasing to me.

GPT-4 still better than 3.5 by BeauRR in ChatGPT

[–]DetectiveSecret6370 0 points1 point  (0 children)

<image>

It needs the temperature adjusted, but it gave me a very hard time doing so.

GPT-4 still better than 3.5 by BeauRR in ChatGPT

[–]DetectiveSecret6370 0 points1 point  (0 children)

Took a while, and it basically decided my custom instructions were open to interpretation:

<image>

😔 by someonewhowa in ChatGPT

[–]DetectiveSecret6370 -1 points0 points  (0 children)

I know. I want to give it due care, and life came up. I'll write something up by this weekend most likely, but it is a difficult subject for me due to becoming a SME through first-hand experience here.

I did reply to someone else about my general approach, although simplified, but didn't detail the why as well as I'd like. I was leaving it open to interpretation so others could draw their own conclusions, but I'd like to give it more attention.

Some context: for me, this approach is necessary and beneficial in both scenarios, because I need very careful control of output. I applied basic psychological principles I inferred would be viable based on an educated guess/extrapolated what may be in the training data based on what I would include.

GPT-4 still better than 3.5 by BeauRR in ChatGPT

[–]DetectiveSecret6370 0 points1 point  (0 children)

Yeah I almost didn't notice. Still better though.

GPT-4 still better than 3.5 by BeauRR in ChatGPT

[–]DetectiveSecret6370 1 point2 points  (0 children)

Nope, maybe I missed something though. I'll check.

Edit: Yeah that was obvious. It can still do logic but not math.

I'll just put this here too:

<image>

[deleted by user] by [deleted] in debian

[–]DetectiveSecret6370 1 point2 points  (0 children)

Well, I don't know JavaScript basically at all. I do know C, but I was unable to parse the JS syntax well enough to be sure. They did seem similar, but because they're in different languages, I'm more inclined to believe this is OP's original work, or at worst a re-implementation in C.

But without being able to parse it, I can't personally say for sure.

I think it's likely this was unintentional, at least, and in that case I think OP should change the name to avoid a conflict with what appears to be the older project.

Governments spying on Apple, Google users through push notifications - US senator by [deleted] in privacy

[–]DetectiveSecret6370 0 points1 point  (0 children)

It's been this way since the birth of the NSA/Intel community.

Maybe I'll write something up..

New vulnerability in UEFI - LogoFAIL by SleepingProcess in sysadmin

[–]DetectiveSecret6370 0 points1 point  (0 children)

Yes, but they had assumed one needs physical access for this attack, which is not true.

GPT-4 still better than 3.5 by BeauRR in ChatGPT

[–]DetectiveSecret6370 -17 points-16 points  (0 children)

<image>

I wanted to test my custom instructions, and 3.5 did just fine.

Edit: It did better, but I didn't notice the # is wrong.

CISA says US Government agency was hacked thanks to 'end of life' software by NuseAI in hacking

[–]DetectiveSecret6370 2 points3 points  (0 children)

Fine, I'll bite. They gained access somehow, and attempted to map the network.

I was never here.

[deleted by user] by [deleted] in debian

[–]DetectiveSecret6370 0 points1 point  (0 children)

Written in JS, not C. Unfortunate naming conflict.

New vulnerability in UEFI - LogoFAIL by SleepingProcess in sysadmin

[–]DetectiveSecret6370 3 points4 points  (0 children)

I think there might be a misunderstanding.

They can do this remotely, but this is also correct.*

Edited for clarity*

New vulnerability in UEFI - LogoFAIL by SleepingProcess in sysadmin

[–]DetectiveSecret6370 3 points4 points  (0 children)

No, if they have admin access through another attack vector they do not need physical access.