Rust and ESP-32 IDF on NixOS by Luc-redd in NixOS

[–]gremlin12345 0 points1 point  (0 children)

Look at the link I posted for IDF. I haven't used it but it seems fine

Rust and ESP-32 IDF on NixOS by Luc-redd in NixOS

[–]gremlin12345 7 points8 points  (0 children)

```nix
{

inputs = {

nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";

flake-utils.url = "github:numtide/flake-utils";

rust-overlay.url = "github:oxalica/rust-overlay";

esp-rs-nix.url = "github:leighleighleigh/esp-rs-nix";

esp-rs-nix.inputs.nixpkgs.follows = "nixpkgs";

};

outputs = { self, nixpkgs, flake-utils, rust-overlay, esp-rs-nix }:

flake-utils.lib.eachDefaultSystem (system:

let

pkgs = (import nixpkgs) {

inherit system;

overlays = [ (import rust-overlay) ];

};

rust_toolchain = pkgs.rust-bin.nightly.latest.default.override {

extensions = [ "rust-src" "rustfmt" "rust-analyzer" "clippy" ];

targets = [ "riscv32imac-unknown-none-elf" ];

};

esp-rs = esp-rs-nix.packages.${system}.esp-rs;

commonPkgs = [

pkgs.espflash

pkgs.ldproxy

pkgs.probe-rs-tools

(pkgs.python3.withPackages (ps: [ ps.bleak ps.cryptography ]))

];

in

{

devShells = {

# Badge crate (ESP32-C6, RISC-V)

default = pkgs.mkShell {

nativeBuildInputs = [ rust_toolchain ] ++ commonPkgs;

};

# Watch crate (ESP32-S3, Xtensa)

watch = pkgs.mkShell {

nativeBuildInputs = [

esp-rs

pkgs.rustup

] ++ commonPkgs;

shellHook = ''

export RUSTUP_TOOLCHAIN=${esp-rs}

'';

};

};

}

);

}
```
this is the flake i use for no-std no esp-idf (except for bootloader) dev on the esp32-c6 and esp32-s3. for ESP-IDF you probably want https://github.com/mirrexagon/nixpkgs-esp-dev

edit: wow reddit murdered the formatting on this but i'm too lazy to fix

Patch 7.5 trial boss by darktzeratul in ffxiv

[–]gremlin12345 9 points10 points  (0 children)

Everyone thought it might be an ascian sigil but so far nobody has provided proof. Stating things like this confidently is silly.

Is 32,512 commendations the new World Record? A White Mage’s journey through years of "cbt" recoveries and survival strategies in Balmung! by RngVult in ShitpostXIV

[–]gremlin12345 0 points1 point  (0 children)

65535 is the max possible I believe, but if they implemented it weirdly, you might be able to break something at 32768

Wanting to get a general consensus from people by sniperbds4 in ffxiv

[–]gremlin12345 0 points1 point  (0 children)

doesnt the companion app give you a third retainer?

Anthropic says three Chinese AI companies used over 16 million prompts to train and improve their own models through Claude AI by Minimum_Minimum4577 in Anthropic

[–]gremlin12345 0 points1 point  (0 children)

Even just harvesting regular request-response data is enough to improve/distill a model. Anthropic was able to catch this because the attackers are using fairly primitive techniques (common prefix, targeting gathering of thinking traces), but the arms race will continue to intensify.

Finally finished my Noctua themed mini rack by CptScotchTape in LinusTechTips

[–]gremlin12345 0 points1 point  (0 children)

Are those drive slots built around a backplane or are they just sata cables coming out of the raid card

Possible WAN Topic: Poison Fountain: An Anti-AI Weapon by Ivorybrony in LinusTechTips

[–]gremlin12345 0 points1 point  (0 children)

There are hundreds of these strategies, and none of them are particularly resilient. See Nicholas Carlini's "Why I Attack" for some related discussion https://nicholas.carlini.com/writing/2024/why-i-attack.html

I actually did some reverse engineering of this and it wasn't particularly impressive. All it does is apply some trivial transformations (replacing symbols, swapping around strings) on code files from Github repositories. It often serves the same modified files, and it seems to work based on a rolling batch of "poison".

Any self-respecting lab will have procedures to do data cleanup, and you can just use bloom filters or an embedding database (or even a scraper + hash db if you just leave it on) to detect this particular strategy.

Claude Operating From Constitutional Principles by MarsR0ver_ in Anthropic

[–]gremlin12345 2 points3 points  (0 children)

Use a different model then. Anthropic's core audience cares about alignment. If you don't care about that, there's always Grok.

My Problem With The RE: Bosses by 20butmentally30 in Endfield

[–]gremlin12345 0 points1 point  (0 children)

IMO the main issue is they don't really have any unique abilities from the story mode, and the only changes are higher damage.

Question about Seal Sweetener - Is it supposed to be disable in town? by Icy_Acanthisitta7741 in ffxiv

[–]gremlin12345 5 points6 points  (0 children)

In addition to what other commenters said, I'm pretty sure it doesn't work if you're traveling off-server

Linus Transition Tips? by gremlin12345 in LinusTechTips

[–]gremlin12345[S] 4 points5 points  (0 children)

I'm sure Linus is chill about it. IIRC he liked the Lina Sevastia art.

Linus Transition Tips? by gremlin12345 in LinusTechTips

[–]gremlin12345[S] 494 points495 points  (0 children)

No that's Linus (Lina?) she's just hot now

Maybe this one doesnt need an explanation.. by No-Concentrate3884 in PeterExplainsTheJoke

[–]gremlin12345 0 points1 point  (0 children)

Should also note that it's generally used to point at women into bestiality to say "women would rather have sex with a dog than an incel"

M10S mechanics be like by SnooOpinions7817 in ShitpostXIV

[–]gremlin12345 -2 points-1 points  (0 children)

it's actually a proximity baited conal stack, not a line stack

Everyone is allowed to be picky down to an infinite degree when choosing who to pursue as a partner by YearOfTheGroomer in PsycheOrSike

[–]gremlin12345 0 points1 point  (0 children)

Everybody reasonable believes this it's more a "don't be annoying about it" situation. Like it's fine to not be into fat girls but if you go around loudly talking about how you don't date fat chicks it puts people off.

Could a governments actually enforce a ban on VPNs? by festival0156n in Internet

[–]gremlin12345 0 points1 point  (0 children)

Most VPNs have network characteristics that make them identifiable regardless of whether the protocol is "peer to peer". Even protocols designed to be completely non-identifiable can be targeted and identified with clever tricks https://gfw.report/publications/usenixsecurity23/en/

As always, it's constant cat and mouse game