Did you try to do this workflow with local models? If so, in your experience what are the better models for this?
- 1 Post
- 12 Comments
ZeDoTelhado@lemmy.worldto
Linux@lemmy.ml•BombShell: The Signed Backdoor Hiding in Plain Sight on Framework Devices - Eclypsium | Supply Chain Security for the Modern Enterprise
2·12 days agoFixed on bios, but from what I see, the dbx part is still missing in some models. They are working on it at least
ZeDoTelhado@lemmy.worldto
PC Gaming@lemmy.ca•Clair Obscur: Expedition 33 quietly tops 4.4 million in salesEnglish
14·1 month agoJust because something is popular does not mean you will like it. Different tastes and all that.
As for me, more variety means more reach to gamers out there. What I don’t like to see is stagnation for years on established IP to the point is becomes boring (for me personally, Pokémon falls a lot into this category for most releases. The only Pokémon game I liked recently was arceus, simply because the whole battle and catch system got revamped to be something different for once)
ZeDoTelhado@lemmy.worldto
PC Gaming@lemmy.ca•Randy Pitchford Snaps Back at Borderlands 4 Criticism: 'Code Your Own Engine'English
29·1 month agoCode your own engine. What a grown up response to all this. Expected nothing less from him.
ZeDoTelhado@lemmy.worldto
Privacy@lemmy.ml•/e/ OS does a little trolling and sends all your Text to Voice data to OpenAI for processing and Speech generation.
312·2 months agosend the DB entries of your Downvotes on a Thumb drive (or anything else from SSD to 3.5 inchHDD, depending on your preferences), and shove it up your rectum.
Do not threaten them with a good time
I tried a couple of times with Jen ai and local llama, but somehow does not work that well for me.
But at the same time i have a 9070xt, so, not exactly optimal
So is not on this rack. OK because for a second I was thinking somehow you were able to run ai tasks with some sort of small cluster.
I have nowadays a 9070xt on my system. I just dabbled on this, but until now I havent been that successful. Maybe I will read more into it to understand better.
I have a question about ai usage on this: how do you do this? Every time I see ai usage some sort of 4090 or 5090 is mentioned, so I am curious what kind of ai usage you can do here
It’s a high paced fps in general. The original mode is semi roguelite, meaning, you have to go every 10 floors in order to get a checkpoint. If you don’t, back to the previous checkpoint and get different perks for the run.
For me the whole cyberpunk esque thing about it sold me. And is also a quite unusual sort of shooter.
Only a tad short, that is my biggest complaint (but price does match the time so I can’t say much)
Recently finished mullet madjack, decided to replay quake 2
ZeDoTelhado@lemmy.worldto
Privacy@lemmy.ml•KeePassXC: Convenience of single passwords file and security of having multiple protected databases possible?
1·9 months agoSo what you want to do, effectively, is to have different security requirements for different accounts. Correct? And all in the same file.
For now I just want to get a few things out of the way:
- with this strategy, what are you protecting against?
- how likely is this to happen?
- what is your contingency plan?
I believe its good to have different levels of security for different things, but you also have to understand at what cost you need it.
I can propose a different thing altogether: for the very important passwords, like banks and such, use the pepper method. This means, you have on your password manager part of your password, and a small portion is something you know. Example: generate a 25 chars password, and have at the beginning or end, more 5 chars that you know (can be letters and numbers, and can be something you remember every day, like the first letters of your address plus house number).
With this approach, there are a couple of benefits:
- you can still have computacionaly heavy passwords
- if an attacker gets a hold of your open vault and try to login, it will fail since the password is effectively not complete
Biggest downside I see is remembering the pepper always. And make sure is not written anywhere. And of course, yo can always argue it is possible at some point to get the correct password with the base password known. But at this point, thus should give you enough time to change it and thwart the attack. Remember: there is no perfect security solution, only sufficiently good ones that can be usable and effective.

I do not use models in general online, but my needs are also much smaller. Max I use my local model for ollama is translations. I am always interested in seeing more focused models so we can use on lower end hardware