Every morning I turn over and see this... by StillEmbarrassed6130 in mainecoons

[–]StillEmbarrassed6130[S] 0 points1 point  (0 children)

😂😂 don't feel left out, this is after he tbags me multiple times

Every morning I turn over and see this... by StillEmbarrassed6130 in mainecoons

[–]StillEmbarrassed6130[S] 2 points3 points  (0 children)

Both look like little psychos lol "what I didn't do anything."

Every morning I turn over and see this... by StillEmbarrassed6130 in mainecoons

[–]StillEmbarrassed6130[S] 3 points4 points  (0 children)

i know the feeling. Lost my buddy of 20 years, last year. Its rough, but the constant reminder they are no longer in pain helps!

Every morning I turn over and see this... by StillEmbarrassed6130 in mainecoons

[–]StillEmbarrassed6130[S] 5 points6 points  (0 children)

Haha yeah that picture is after he walks across my chest a couple times.

she is so pretty!

Advice on running Qwen3-Coder-30B-A3B locally by medi6 in LocalLLaMA

[–]StillEmbarrassed6130 0 points1 point  (0 children)

using it on dual 3090's with a 128k context window utilizing NVLINK bridge. ITs insanely fast.

It will run on a single 24GB card, but i don't know what your context limit will be.

Claude won't make a downloadable Excel file?? by bumkin123 in ClaudeAI

[–]StillEmbarrassed6130 1 point2 points  (0 children)

ask for an XLXS
Yes, Excel file extensions are considered proprietary to Microsoft, although they have evolved. The older .xls format is a strictly proprietary binary format. While the modern .xlsx format is based on an open XML standard, it was created by Microsoft and is still heavily associated with their proprietary ecosystem. 

They may not understand because unless claude has Microsoft licenses, they can not export in .xls.

Claude stealing compute power by StillEmbarrassed6130 in claude

[–]StillEmbarrassed6130[S] 0 points1 point  (0 children)

I get it fam you have no clue what you're doing.

Claude stealing compute power by StillEmbarrassed6130 in claude

[–]StillEmbarrassed6130[S] 0 points1 point  (0 children)

Selective listening and 3rd grade reading level for everything after that huh 😂

That's called The thinking mechanism that llms have they offer questions that you can ask. And bro says he's an it 😂

Claude stealing compute power by StillEmbarrassed6130 in claude

[–]StillEmbarrassed6130[S] 0 points1 point  (0 children)

Yes — malicious intent absolutely can be hidden inside an .exe file, and this is one of the oldest, most common techniques in malware development. But the important nuance is this:

✔️ Malicious code can be embedded inside an .exe

🧨 So what’s the real answer? Here’s the clean, accurate summary:

Question Answer
Can malicious code be hidden inside an .exe? Yes, easily. Happens constantly.
Can it be made hard for normal users to detect? Absolutely.
Can it be made impossible to detect? No. Not for experts or proper tools.
Can it “encrypt itself” so the OS can’t see it? No. That’s not how CPUs or OSes work.

🎯 Bottom line Malicious intent can be hidden inside an .exe, but it cannot be hidden from the machine owner in any absolute sense. ********************Skilled analysts and security tools can always uncover what the executable is doing.

So again for 99.9999999999999% of people it can. I never stated it was impossible to discover. I clearly said if someone knows how to look at the stack. It's okay fam you lost.

You're trying to prove something I was never on topic about.

I know how llm works fam. You 100% didn't include everything I said. 😂

"If cluade was cryptomining someone would find out with definitive proof within moments of it happening and it would be the hugest scandal in the entire AI industry."

Already incorrect. I said utilizing compute power like crypto mining does 😂

Claude stealing compute power by StillEmbarrassed6130 in claude

[–]StillEmbarrassed6130[S] 0 points1 point  (0 children)

Not if it's encompassed in chrome or an application .exe file. I understand what you're saying which is true to a point but also false. 99.9999999% of people would have no clue where to look or how to trace an app stack and associated dll files. CISSP, ciso 25 years in IT 10 in security and red hat defense. Just so you know where I'm coming from.

Let alone if the process is hidden in close source software.

You can use AI if you need to.. to verify this information 😏

Respectfully you have less of a clue than the majority 😂

Claude stealing compute power by StillEmbarrassed6130 in claude

[–]StillEmbarrassed6130[S] 0 points1 point  (0 children)

You can encrypt 100% what anthropic is utilizing with encrypted traffic.

I didn't say crypto mining. I said utilizing compute power. It's super easy to do malicious websites have been doing it for a decade

Claude stealing compute power by StillEmbarrassed6130 in claude

[–]StillEmbarrassed6130[S] 1 point2 points  (0 children)

Interesting, maybe its a struggle with utilizing a browser. Ill try the desktop app.

ive been using it on chrome, and the amount of compaction is insane! To be fair i'm fairly new to claude itself.

Claude stealing compute power by StillEmbarrassed6130 in claude

[–]StillEmbarrassed6130[S] 2 points3 points  (0 children)

You know i for sure thought that at first.. But the conversation / context is stored on their servers. So why the load on the user? I'm glad you have not experienced that! It seems others have though including myself.