The AI Community On Kbin

lampinen,
@lampinen@sigmoid.social avatar

How well can we understand an LLM by interpreting its representations? What can we learn by comparing brain and model representations? Our new paper (https://arxiv.org/abs/2405.05847) highlights intriguing biases in learned feature representations that make interpreting them more challenging! 1/9

lampinen,
@lampinen@sigmoid.social avatar

For example, if we train a model to compute a simple, linear feature and a hard, highly non-linear one, the easy feature is naturally learned first, but both are generalized perfectly by the end of training. However, the easy feature dominates the representations! 3/9

lampinen,
@lampinen@sigmoid.social avatar

This paper is really just us finally following up on a weird finding about RSA (figure on the here) from a paper Katherine Hermann & I had at NeurIPS back in the dark ages (2020): https://x.com/khermann_/status/1323353860283326464
Thanks to my coauthors @scychan_brains & Katherine! 9/9

gergely,

Git login and commit signing with security

Doing software engineering (well-ish) is pretty hard to imagine without working in version control, which most of the time means git. In a practical setup of git there’s the question of how do I get access to the code it stores — how do I “check things out”? — and optionally how can others verify that it was indeed me who did the changes — how do I “sign” my commits? Recently I’ve changed my mind about what’s a good combination for these two aspects, and what tools am I using to do them.

Access Options

In broad terms git repositories can be checked out either though the HTTP protocol, or through the SSH protocol. Both have pros and cons.

Having two-factor authentication (2FA) made the HTTP access more secure but also more setup (no more direct username/password usage, rather needing to create extra access keys used in place of passwords). Credentials were still in plain text (as far as I know) on the machine in some git config files.

The SSH setup was in some sense more practical one (creating keys on your own machine, and just passing in the public key portion), though there were still secrets in plain text on my machine (as I don’t think the majority of people used password-protected SSH keys, due to their user experience). This is what I’ve used for years: add a new SSH key for a new machine that I’m working on, check code out through ssh+git, and work away.

When I’ve recently came across the git-credential-manager tool that supposed to make HTTP access nicer (for various git servers and services), and get rid of plain text secrets. Of course this is not the first or only one of the tools that does git credentials, but being made by GitHub, it had some more clout. This made me re-evaulate what options do I have for SSH as well for similar security improvements.

Thus I’ve found that both 1Password and KeePassXC (the two main password managers I use) have ssh-agent integration, and thus can store SSH keys + give access to them as needed. No more plain text (or password protected) private keys on disk with these either!

Now it seems there are two good, new options to evaulate, and for the full picture I looked at how the code signing options work in this context as well.

Code Signing Options

When signing my commits to authenticate authorship, it’s possible to use PGP/GPG (the “classic way”), or now also SSH keys (as detailed, for example here or here).

The GPG setup is well established, and also links my commits to my identities used elsewhere (e.g. signed emails sent to mailing lists that care about it, with the key linked from this site’s frontpage). This of course is not always needed or desired, but it decouples the identity from the code hosting platform. There’s some serious downsides as well, though: GPG signing keys are not supposed to be numerous (just a single one), and thus if I use multiple machines to work on, I will have to take my private keys with me between machines, for example making copies of them. Or if not making copies, then have them on hardware keys (that have other problems with backups and all that, if I got it right the last time I tried to understand the process).

The SSH key commit signing is much newer (need git version at least 2.34), but it’s also simpler: add a key to my git hosting service, sign commits with that key, and thus the service can match things up and show that match. I can add as many keys as machines I’m working on if needed, no need to transfer or copy keys between machines, and I can also choose use some keys for login only or code signing only.

A third party trying to verify these signatures, though, would need to get the keys from the hosting service (I’d find it surprising if people would distribute their commit signing keys out of band the same way as they do with GPG public keys, since there are likely more of them). Hence it git hosting services will need to make the user’s keys available (as they do at the relevant username.keys URLs, e.g. mine on GitHub and GitLab).

Also can’t forget to add the relevant keys to the list of allowed signing keys locally, and all the other relevant setup (see e.g. the GitHub and GitLab docs). There are a bit too many places to update, but it’s mostly set-it-and-forget-it. After that, once started to sign commits, adding the --show-signatures flag to the commands that support it (git log, git show for example), should show the signatures.

My Winning Combo

Looking at the opions above, there’s a matrix of options that we can use, and here’s what I think about them:

GPG signature SSH key signature
Git Credential Helper Extra setup Simpler
SSH clone The usual Most convenience 👍

Convenience matrix of Git access (rows) and commit signing (columns) optionsReally, where I want to be is just SSH keys for everything, even if they are imperfect, but they have the most number of puzzle pieces to fit.

SSH Key Security

While previously SSH keys were really just held as files in your ~/.ssh folder, most likely, recently I’ve found (tada!) that the password managers I use can also store & serve SSH keys: see in particular 1Password’s SSH documentation and KeePassXC docs (scroll to SSH Agent Integration on that page), though I’m sure other password managers can do this too.

1Password

The two password managers listed above handle things quite similarly. 1Password is a bit less hands-on, though, the default settings work pretty well.

https://gergely.imreh.net/blog/wp-content/uploads/2024/04/Screenshot-2024-04-27-at-11.55.43.pngOne important bit is that 1Password runs its own SSH agent, so that has to be configured in the relevant places, but it’s easy enough. The approvals are also useful, so it’s more transparent when something accesses the key.

1Password pop-up for SSH key usage1Password pop-up for SSH key usage

With this things generally work, and relatively easy to reason about things. When things are less clear, it might be just a debug check-away away from seeing the keys added to this alternate agent:

$ export SSH_AUTH_SOCK=~/Library/Group Containers/2BUA8C4S2C.com.1password/t/agent.sock<br></br>$ ssh-add -l<br></br>256 SHA256:XfRsbxRMm+CN[...snip...]

KeePassXC

KeePassXC, being open source, is my preferred solution of the two, though unsurprisingly it’s the more awkward one to set up. The main differences from 1Password include:

  • needing to generate the keys externally to the password manager (rather than having built-in ssh keygen) – this is a con on usability but a strong pro on basing security on the established tool, rather than potentially questionably reimplement it
  • uses the main SSH agent, so no extra setup is necessary in most of the tools – this is a potential pro on usability for configurations, but a potential con that the worflow and config of loading keys into the agent needs a bit more understanding to be both ergonomic and safe to one’s level of paranoia
  • the key use confirmation defaults to “ok” on pressing Enter on the pop-up (rather than Cancel) – this is a pro on usability, but con on “failing open” rather than closed

SSH key usage confirmation with KeePassXCSSH key usage confirmation with KeePassXC

It’s still a pretty simple workflow, and it’s quite interesting to see how many things KeePassXC learned to do as well.

Experience

Thinking about the various threat models to my SSH crendentials, this setup adds one more layer to the defence in depth, and it does feel more relaxed already (relaxed from a point of stress I didn’t quite know I had before).

Picking the SSH key based login and signing feels like using the most appropriate tech for the moment, and there are still knobs for people to adapt it to their security levels (different SSH keys for login and signing, passwords on the keys themselves, etc…)

This setup works very well when I want to be notified whenever a tool’s using the SSH key so it would be more obvious if a stray process is trying, say exiltrate the keys. On the other hand this breaks down when git itself is running background processes, such as git-maintenance, so that’s not something that I could use here. So far out of (literally) thousands of codebases & repos I’ve used that maintenance setup exactly once, for convenience. For me it is not a major loss, then.

The one bit that feels a step backwards is that having the SSH keys in the password manager and carrying it around counteracts the “separate key for each system” arrangement. This might just be part of getting used to new processes, and not an actual downside.

Further Thoughts

In cybersecurity yesterday’s best practices might be inadecvate today and “last week’s” practices might be outright dangerous… Gonna keep revisiting this setup more broadly and in terms of details, as I learn more.

It’s a good question why even do code signing (besides having a “verified” check mark, which alone doesn’t mean much if not part of a verification process), though this needs some more space to unpack. For the time being I’ll assume that signing is better than not signing, if nothing else than as a forward looking prep for better audit processes down the line.

There’s really a question around having too many things in a single password manager: nowadays it can be the complete “royal flush” of password, TOTP, SSH key, recovery codes, passkey… and likely more bits that I might not be using yet? This does make me uneasy, and likely a scale on which usability and security will adjust over time (such as. bundling and unbundling various cybersecurity aspects).

I might also actually misunderstand various things above, if so, I’d be very keen to hear, just drop me a line!

Original post: https://gergely.imreh.net/blog/2024/05/git-login-and-commit-signing-with-security/

image/png
1Password pop-up for SSH key usage

SIB,
@SIB@mstdn.science avatar

“The Protein Universe Atlas is a groundbreaking resource for exploring the diversity of proteins. Its user-friendly web interface empowers researchers, biocurators and, students in navigating the “dark matter” to explore proteins of unknown function.”

🥁 That’s what the committee said about this work, one of the 2023 👏

👉 Find out more about this and the other outputs: https://tinyurl.com/ye2yrpxx

video/mp4

amadeus,
@amadeus@mstdn.social avatar

Does anyone else maintain (s) for their (s)?
I enter all configuration adjustments and (s) in a file for each machine.
This might seem like unnecessary extra work, but has paid off several times for the sake of traceability or in the past. 🤓

amadeus,
@amadeus@mstdn.social avatar

@solidtrax Oh, how nice! I've wanted to go every year, but never made it. Would be nice to go next year, maybe. 🫣

solidtrax,
@solidtrax@mstdn.social avatar

@amadeus ok, see you next year Amadeus 😉

vingtroiseize,
@vingtroiseize@mastodon.world avatar

It's the perfect time to clean your computer mouse!

#Mouse #computer #retrocomputer #80s #90s #Geek

mjgardner,
@mjgardner@social.sdf.org avatar

@vingtroiseize Always don’t never forget to scrub your balls

tuxedocomputers, German
@tuxedocomputers@linuxrocks.online avatar

TUXEDO Infinity S - Gen1

The TUXEDO Infinity S(mall) series combines high-performance hardware with a space-saving Small Form Factor (SFF) in an infinitely elegant-looking, high-quality metal design.

Have a look: https://www.tuxedocomputers.com/en/TUXEDO-Infinity-S-Gen1.tuxedo

#computer #pc #linux #opensource #highperformance #elegance #highquality #hardware #software #tuxedo #tuxedocomputers

linuxtechmore,
@linuxtechmore@linuxrocks.online avatar

@tuxedocomputers
Looks promising! Can you share more details about the cooling system performance? Also, will there be an option for AMD CPUs in the future?

SubtleBlade,
@SubtleBlade@mastodon.scot avatar

'The computer scientist regarded as the “godfather of ” says the government will have to establish a to deal with the impact of on ' https://www.bbc.co.uk/news/articles/cnd607ekl99o.amp

freemo,
@freemo@qoto.org avatar

Please reboost!

Trying something new, everyone is guaranteed an interview! Open interviews! For a limited time no one will be skipped (except for clear cases of abuse).

So we still have about 10 more 100% remote positions to hire for full-time market-fair positions here at QOTO/CleverThis.

100% remote, work from anywhere, even the beach, market-fair offers. Ethics first, we treat our people like family.

We have an urgent need for Machine learning experts with a background in NLP and Deep Learning (Natural Language Processing and Neural Networks). There is a focus on Knowledge Graphs, Mathematics, Java, C, looking for Polyglots.

We are an open-source first company, we give back heavily to the OSS community.

We need everything from jr to sr, data scientist to programmer. If your IT and your good, you might be a fit.

I will personally be both your direct boss, and hiring manager. I am also the founder and inventor.

The NLP position can be found at this link, other positions can be found on the menu bar on the left:

https://docs.cleverthis.com/en/human_resources/organizational_structure/sr_data_scientist_(nlp)

If you would like to submit yourself for an interview, which for a limited time I am guaranteeing you will get a first stage interview, then you can submit your application here, and even schedule your interview as you apply, instantly!

https://cal.com/team/cleverthis/interview-stage-1

For those of you who cant schedule during core hours you can schedule in my free time if you’d like a chance (the company doesnt have fixed hours):

https://cal.com/team/cleverthis/interview-stage-1-extended

#Fedihire #NLP #MachineLearning #Job #jobs #hiring #Programming #IT #AI #AGI #KnowledgeGraphs #semanticweb #ML #ChatGPT

mc,
@mc@qoto.org avatar

@freemo
"100% remote, work from anywhere, even the beach"
That really tempted me. 😉

freemo,
@freemo@qoto.org avatar

@mc It is a nice perk :)

ai6yr,

Dang, I missed my opportunity to get a fully automated robot farm.

ai6yr,

Oh wait, not quite over. Look, robot growing basil! I suspect you could adapt it to grow algae, which you could bundle into little pellets... Soy... lent.... GREEN! (damn, I think that's now trademarked). #hydroponics

dogfox,
@dogfox@mastodon.social avatar

@ai6yr
Gotta label each basil leaf, I guess.

rdnielsen,
@rdnielsen@floss.social avatar

A new algorithm uses randomness to simplify estimation of the number of distinct elements in a long list:

https://www.quantamagazine.org/computer-scientists-invent-an-efficient-new-way-to-count-20240516/

seniorsguidetocomputers,
@seniorsguidetocomputers@twit.social avatar
kubikpixel,
@kubikpixel@chaos.social avatar
tinfoil-hat,
@tinfoil-hat@social.tinfoil-hat.net avatar
r000t,
@r000t@ligma.pro avatar

@tinfoil@social.tinfoil-hat.net
It's not the memory's fault tho

ramikrispin,
@ramikrispin@mstdn.social avatar

(1/2) MIT Introduction to Deep Learning 🚀🚀🚀

MIT launched the 2024 edition of the Introduction to Deep Learning course by Prof. Alexander Amini and Prof.Ava Amini. The course started at the end of April and will run until June. The course lectures are published weekly. The course syllabus keeps changing from year to year, reflecting the rapid changes in this field.

ramikrispin,
@ramikrispin@mstdn.social avatar

(2/2) The course covers the following topics:
✅ Deep learning foundation
✅ Computer vision
✅ Deep generative modeling
✅ Reinforcement learning
✅ Robot learning
✅ Text to image

Resources 📚
Course website 🔗: http://introtodeeplearning.com/
Video lectures 📽️: https://www.youtube.com/playlist?list=PLtBw6njQRU-rwp5__7C0oIVt26ZgjG9NI

panoptykon, Polish
@panoptykon@eupolicy.social avatar

Za każdym razem, gdy wypuszcza nową regulację, komisarz Thierry Breton publikuje playlistę zatytułowaną jak ta regulacja.

Dziś my* mamy playlistę dla komisarza. Dobrze byłoby żyć w świecie zdrowych algorytmów:
https://open.spotify.com/playlist/34ymNkUEJ8LcospqjZMeW6?si=28c278cd6c534925&nd=1&dlsi=242d749582824199

*sieć People vs. Big Tech






Jorvon_Moss,
@Jorvon_Moss@mstdn.social avatar

I am a professional goof

Playing goofy goober time

johnlogic,
@johnlogic@sfba.social avatar

Earlier today I searched on an interesting question, and found this article that appears to have been generated synthetically by an LLM AI and not proofread at all by humans.

Can you spot where it breaks?

"Can I Use a Crows Foot on a Torque Wrench? Explained by Experts"

By Michael Graw
September 22, 2023

https://www.toolsadvisor.org/can-i-use-a-crows-foot-on-a-torque-wrench/

when #ArtificialIntelligence demonstrates #RealStupidity

Extelec,
@Extelec@mstdn.social avatar

@johnlogic I've wanted to take a wrench to many databases, now I know the correct tool to use :)

Jorvon_Moss,
@Jorvon_Moss@mstdn.social avatar

My face when my codeing. its not my fav part #maker #Robot #Programming

geekmomprojects,
@geekmomprojects@mastodon.social avatar

@Jorvon_Moss Digit looks pensive too

jon,
@jon@vivaldi.net avatar

Results on my about trackpad tap to click.

114 responded.

65% enable tap to click and love it!
29% disable tap to click.
6% had tap to click enabled and hate it!

So about two thirds prefer tap to click.

Personally I would argue that it should be off by default, but I belong to the last group. I was finding that I was having a lot of issues with my trackpad and most went away when I changed the setting. I still have an issue at times that clicking sometimes leads to right clicking.

I have been using trackpoints for years, so I guess I am rather used to an experience with clear button clicks.

jon,
@jon@vivaldi.net avatar

@zbrando , I have had a lot of Thinkpads over the years. I also had the Thinkpad anniversary edition. Right now I am testing something else.

Nobody makes the laptop I want with all the features I want. Sad, but true.

zbrando,
@zbrando@vivaldi.net avatar

@jon Yeah, nowadays electronics are all the same: laptops, TVs, smartphones... Even cars. Almost nobody likes to risk with design. 🙄

ai6yr,

NHTSA reports 22 incidents, 17 crashes or fires involving Waymo vehicles. https://static.nhtsa.gov/odi/inv/2024/INOA-PE24016-12382.pdf

janriemer,

Zed Decoded: Rope & SumTree - by Zed Industries

https://zed.dev/blog/zed-decoded-rope-sumtree

Absolutely fascinating deep-dive into the core data structures the folks at Zed Industries use for their #Zed #editor!

"Currently there are over 20 uses of the SumTree in Zed. [...] The list of files in a project is a SumTree. The information returned by git blame is stored in a SumTree. Messages in the chat channel: SumTree. Diagnostics: SumTree."

Oh, how I love this! ✨

#DataStructure #Algorithm #Rust #RustLang

EclecticHuman,
@EclecticHuman@zirk.us avatar

I like my photos, but feel a bit of a fraud posting them. I saw only faint grey wisps of mist; it was my 's that imbued that mist with colour and shape.
Is it deceptive to distort reality with these photos?
Or (at least on occasion) are phone cameras marvelous tools, like telescopes, macro lenses, or infrared filters, which can actually show us new ways of seeing?
"Beauty is truth, truth beauty..."

Northern lights: green and pink streaks radiate out from the centre of the sky. One star is visible.

animaux,
@animaux@oslo.town avatar

@grb090423 @EclecticHuman in this case it is actually mostly that the cameras are more sensitive than the eye

grb090423,
@grb090423@mastodon.social avatar
weilawei,
@weilawei@mastodon.online avatar

The first general-purpose programmable digital electronic computer was designed with mouse resistance in mind.

https://inv.tux.pizza/watch?v=EcWsNdyl264

#ENIAC #computer #history

peterdrake,
@peterdrake@qoto.org avatar

From Prince, Understanding Deep Learning.

#DeepLearning #MachineLearning #math #mathtodon

mrcompletely,
@mrcompletely@heads.social avatar

@peterdrake holy cow that little purple guy really could do it all

peterdrake,
@peterdrake@qoto.org avatar

@mrcompletely It would be even better if one of the equations involved his symbol.

I read a programming language textbook by a Dr. Scott, who included an example involving Brad and Janet.

JamesBaker,
@JamesBaker@social.openrightsgroup.org avatar

I tried to do a Tik Tok video about how the online safety act would censor content and it was ironically throttled for mentioning categories that would be censored. I think we ought to try and use different platforms to reach people about digital rights issues but those platforms don’t make it easy to do so.

ccanonne,
@ccanonne@mathstodon.xyz avatar

📢 Next week (Wed 05/15) at 10am PT/1pm ET, Julia Chuzhoy from TTIC will talk on TCS+ about "Faster Combinatorial for Bipartite Matching"

Details: https://tcsplus.wordpress.com/2024/05/09/tcs-talk-wednesday-may-15-julia-chuzhoy-ttic/
Register (optional): https://docs.google.com/forms/d/e/1FAIpQLSfwuFbfnw9T_Hmtbjdb2oJ5jADCnOZ3tjwOexzI0OzS4_rIPw/viewform

  • All
  • Subscribed
  • Moderated
  • Favorites
  • ArtificialIntelligence
  • mdbf
  • DreamBathrooms
  • InstantRegret
  • magazineikmin
  • Youngstown
  • everett
  • anitta
  • slotface
  • GTA5RPClips
  • rosin
  • thenastyranch
  • kavyap
  • tacticalgear
  • modclub
  • JUstTest
  • osvaldo12
  • Durango
  • khanakhh
  • provamag3
  • cisconetworking
  • ngwrru68w68
  • cubers
  • tester
  • ethstaker
  • megavids
  • normalnudes
  • Leos
  • lostlight
  • All magazines