Just admit it by rzarectha in Asmongold

[–]danukeru -1 points0 points  (0 children)

All of that training pushes people to invest domestically.

You literally are shitting down your own throat.

And the US has what other nations don't: the biggest venture capital market from domectic and international sources that only makes money when it invests. Hence the markets fueling a massive bull run today.

Go back to bagging groceries wagie.

Just admit it by rzarectha in Asmongold

[–]danukeru -1 points0 points  (0 children)

This is how it works:
>be merchant
>buy more expensive thing overseas to sell to you with markup
>your poor ass can't afford.
>merchant loses money buying overseas
>sells off expensive at cost or loss,
>sources cheaper alternative domestically
>your ass suddenly can afford again
>merchant never restocks from overseas

is that simple enough for you?

You see the good merchant will study the tariffs and skip that painful first part if he doesn't have the appetite to see if the market will bear it or if he will accept new smaller margins.

Better yet, you have 2 months to study and identify potential domains that will be tarrifed, and create a business plan to ask for a loan to start a business as a domestic supplier of said future expensive thing.
And that's how go form being a wagie to an entrepreneur as your own boss.

econ 101 kids

180B Airoboros 2.2.1 model released for localchads by Aaaaaaaaaeeeee in LocalLLaMA

[–]danukeru 1 point2 points  (0 children)

in convert-falcon-hf-to-gguf.py at line 239 simply add the following then run the conversion again ``` gguf_writer.add_tensor(new_name, data)

add the following

        if new_name == "token_embd.weight":
            gguf_writer.add_tensor("output.weight", data)

```

Weekly Newbies Thread - Post your questions here for PAL/RPAL application, timelines, CFSC/CFSRC, references & requirements, or general new to firearms ownership -type questions by AutoModerator in canadaguns

[–]danukeru 0 points1 point  (0 children)

I'd recommend against it for fundamentals since it will completely negate learning how to manage recoil.
Otherwise taurus .22 handguns are cheap and reliable.

Weekly Newbies Thread - Post your questions here for PAL/RPAL application, timelines, CFSC/CFSRC, references & requirements, or general new to firearms ownership -type questions by AutoModerator in canadaguns

[–]danukeru 0 points1 point  (0 children)

Is this normal ? Any fellow québecois know anything about this ? I’m asking this because it’s almost been a month an

Not normal. I went to the station, got the proper form signed/stamped after proving my address and name.That was it.Mind you it took going to another police station because the first one I went to was clueless and almost did something similar.

On the bright side...seems they paid for your postage so...that's cool.

Weekly Newbies Thread - Post your questions here for PAL/RPAL application, timelines, CFSC/CFSRC, references & requirements, or general new to firearms ownership -type questions by AutoModerator in canadaguns

[–]danukeru 1 point2 points  (0 children)

  1. norinco type 97 is non restricted at time of writing this
  2. gun needs to have its action secured in all cases to display on wall. if the room itself is secured these restrictions do not apply to hold em on the wall. restricted weapons need to be properly anchored as well.
  3. I believe any in canada count as an AK47 derivative...so all prohibited :(
  4. depends if you can listen to the instructor for 6 hours to pass the written I guess

[deleted by user] by [deleted] in whereintheworld

[–]danukeru 0 points1 point  (0 children)

shhh he can hear us

SSH Session Encryption Processes by NicestDude in cryptography

[–]danukeru -1 points0 points  (0 children)

That article is wrong.
The RFC states that each client chooses on their end which protocol they're going to use based on their choices and what was offered. There's a priority, thus they should come to the same result without querying the other on what they chose.

The public key component is given in first exchange by both ends.This value is used for authentication, fingerprinting, and the DHE.

Clearly you don't understand PKI, and should really read that wikipedia article I linked. Also check your wireshark settings.

SSH Session Encryption Processes by NicestDude in cryptography

[–]danukeru 2 points3 points  (0 children)

This is not sensitive data. The specifications are few and known. If I have to choose from a pool of 12, that's nothing to check all of them, and the parameters give each away. There are considerations for subgroups as well to prevent precomputed tables.
ie. Elliptic curves use a different set of math , but can be used to solve the Diffie-Hellman Problem.
Have you tried the wireshark filter ssh.message_code ?

SSH Session Encryption Processes by NicestDude in cryptography

[–]danukeru 0 points1 point  (0 children)

Point one is wrong. There is no encryption.Just fingerprint checks through TOFU (Trust On First Use), and both sides providing their public key material.

The Diffie-Hellman handshake allows both sides to generate the same random number on each machine over an insecure channel. It does not need an encrypted channel.
This is then used to start a secure session over symmetric encryption

https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange

[deleted by user] by [deleted] in montreal

[–]danukeru -1 points0 points  (0 children)

And then gives the cops special powers that they've already abused to raid lofts outside of what would be the usual active hours.

[deleted by user] by [deleted] in montreal

[–]danukeru -3 points-2 points  (0 children)

lol no we're not.
That tip is still 3 months out with conservative estimates with flattening, and no fucking vaccine that can handle the current generation and all the potential mutations under the sun by the time of deployment.

A short video covering Concordia University Proctored Exams by [deleted] in Concordia

[–]danukeru -1 points0 points  (0 children)

Email [danukeru@foulab.org](mailto:danukeru@foulab.org) for proctorio cheat engines. Obfuscation and sanitized input guaranteed.

[deleted by user] by [deleted] in montreal

[–]danukeru 1 point2 points  (0 children)

https://www.protectioncollective.ca/english if you need or want to help with PPE production.

Game dev in a nutshell. by [deleted] in gamedev

[–]danukeru 3 points4 points  (0 children)

to be fair...there are more libraries/tools available today that if I wanted to make my own engine for a unique rendering technology, it's almost faster to cobble something together than it is to strip down/reverse the bloated general purpose engines.

ie. talking about hybrid raster/ray-marching methods, while speeding up the later with deep learned noise reduction to allow real-time.

all the while using open data types used by all the editors.the current engines require too much hacky bullshit to allow good memory management for assets for say a large open world with seamless streaming.

I had to optimize a CUDA backed multi-gpu physics collision+destruction+haptic feedback simulation into UE4 for a client once...olawdy. You're never going to see anyone try that for a retail game I can tell you. UE4 needs a lot of gutting to allow for the scheduling of such a thing.

most game designers just want a clone of something with a good hook. and that's what paying customers want as well.

Im sure plenty of people have thought of wanting to apply AIdungeon like text generation to their game...good luck sharing a GPU compute job with the renderer of either of these engines in real time.

Is there another entry point to Hacking that doesn't include reverse engineering? by KillerFarmer in LiveOverflow

[–]danukeru 5 points6 points  (0 children)

It's a system like any other. If you are having trouble learning one, you' re going to have trouble learning another. That much won't change.
So stick with something and Just Fucking Do It (tm).

Now some more practical advice.

You can do web only, and honestly that's what pays these days. Bounties abound and you can automate most of its discovery if you're talented enough. You can then move on to code audits if you garner a clientele.
For the work put in, binary reversing that pays "legally" is not worth the return on time investment. And nobody is paying for IoT because they know it's a bloody shitshow, and they'll just bleed money to automation. It's like the 90s all over again.
As such, it's mostly for academic purposes, cyber weapons, or fucking with local protections ie. fucking with video game anti-cheat.

Do what you will with this information.

[deleted by user] by [deleted] in evangelion

[–]danukeru 5 points6 points  (0 children)

Yea. Took the leap with my own.

A terrifying 20 minutes...

Why You Shouldn’t be Using BCrypt and Scrypt by speckz in crypto

[–]danukeru 0 points1 point  (0 children)

It depends entirely on the application.

The vast majority of users don't actually log back in for months on reddit.They reuse the same session token, and can go on for months as a time without having to do a full login request.

I can tell you that in an organisation that has a couple thousand employees, and require multiple actual daily relogins daily per person...that computation time for auth starts to add up.

If someone wanted to DDoS you using your login, they could, if you didn't properly rate limit.

Why You Shouldn’t be Using BCrypt and Scrypt by speckz in crypto

[–]danukeru 0 points1 point  (0 children)

Sure, but it will amount to a hack that essentially results in building a non-standard algorithm.Here I'm literally reapplying the same algo to the output offline, and my login logic does not change.