InfoSec Person | Alt-Account#2
Yes, this would essentially be a detecting mechanism for local instances. However, a network trained on all available federated data could still yield favorable results. You may just end up not needing IP Addresses and emails. Just upvotes / downvotes across a set of existing comments would even help.
The important point is figuring out all possible data you can extract and feed it to a “ML” black box. The black box can deal with things by itself.
My bachelor’s thesis was about comment amplifying/deamplifying on reddit using Graph Neural Networks (PyTorch-Geometric).
Essentially: there used to be commenters who would constantly agree / disagree with a particular sentiment, and these would be used to amplify / deamplify opinions, respectively. Using a set of metrics [1], I fed it into a Graph Neural Network (GNN) and it produced reasonably well results back in the day. Since Pytorch-Geomteric has been out, there’s been numerous advancements to GNN research as a whole, and I suspect it would be significantly more developed now.
Since upvotes are known to the instance administrator (for brevity, not getting into the fediverse aspect of this), and since their email addresses are known too, I believe that these two pieces of information can be accounted for in order to detect patterns. This would lead to much better results.
In the beginning, such a solution needs to look for patterns first and these patterns need to be flagged as true (bots) or false (users) by the instance administrator - maybe 200 manual flaggings. Afterwards, the GNN could possibly decide to act based on confidence of previous pattern matching.
This may be an interesting bachelor’s / master’s thesis (or a side project in general) for anyone looking for one. Of course, there’s a lot of nuances I’ve missed. Plus, I haven’t kept up with GNNs in a very long time, so that should be accounted for too.
Edit: perhaps IP addresses could be used too? That’s one way reddit would detect vote manipulation.
[1] account age, comment time, comment time difference with parent comment, sentiment agreement/disgareement with parent commenters, number of child comments after an hour, post karma, comment karma, number of comments, number of subreddits participated in, number of posts, and more I can’t remember.
Yep! Series 4 hasn’t “released” on YouTube yet. I saw Paul William’s story on instagram that they’re releasing Series 5 on TV, but sadly I don’t have access to that. I’m fine being behind by 1-2 years though.
I’m a huge fan of the original British TM, but TM New Zealand is honestly amazing. The whole thing is available on YouTube (thanks Little Alex Horne + team!!!).
In my and many of my friends’ opinion, TM New Zealand Series 2 is one of the best TM series. TM New Zealand in general is absolutely unhinged.
Series 1 feels a bit off, which is probably because it’s unlike British TM. I got used to it fairly quick though.
TM NZ Series 3 (final episode releases on YouTube in 2-3 days)
I knew about the “Thour” meme, but still didn’t get why the directory turned compressed. My guess is that by licking the lemon, the directory folds in on itself, thus becoming compressed.
The debug version you compile doesn’t affect the code; it just stores more information about symbols. The whole shtick about the debugger replacing instructions with INT3 still happens.
You can validate that the code isn’t affected yourself by running objdump on two binaries, one compiled with debug symbols and one without. Otherwise if you’re lazy (like me 😄):
https://stackoverflow.com/a/8676610
And for completeness: https://gcc.gnu.org/onlinedocs/gcc-14.1.0/gcc/Debugging-Options.html
Excellent question!
Before replacing the instruction with INT 3, the debugger keeps a note of what instruction was at that point in the code. When the CPU encounters INT 3, it hands control to the debugger.
When the debugging operations are done, the debugger replaces the INT 3 with the original instruction and makes the instruction pointer go back one step, thereby ensuring that the original instruction is executed.
https://en.wikipedia.org/wiki/INT_(x86_instruction) (scroll down to INT3)
https://stackoverflow.com/a/61946177
The TL;DR is that it’s used by debuggers to set a breakpoint in code.
For example, if you’re familiar with gdb, one of the simplest ways to make code stop executing at a particular point in the code is to add a breakpoint there.
Gdb replaces the instruction at the breakpoint with 0xCC, which happens to be the opcode for INT 3 — generate interrupt 3. When the CPU encounters the instruction, it generates interrupt 3, following which the kernel’s interrupt handler sends a signal (SIGTRAP) to the debugger. Thus, the debugger will know it’s meant to start a debugging loop there.
Surprised no one’s mentioned HTTP Cats yet:
Personally, HTTP 405 (Method not allowed) is my favorite:
For anyone else who doesn’t want to spend 10 seconds trying to imagine it.
See also: Nominative Determinism. If I remember correctly, there was a subreddit about this.
https://en.wikipedia.org/wiki/Nominative_determinism
Nominative determinism is the hypothesis that people tend to gravitate towards areas of work that fit their names. The term was first used in the magazine New Scientist in 1994, after the magazine’s humorous “Feedback” column noted several studies carried out by researchers with remarkably fitting surnames. These included a book on polar explorations by Daniel Snowman and an article on urology by researchers named Splatt and Weedon. These and other examples led to light-hearted speculation that some sort of psychological effect was at work.
Do you want to return to that account?
If not, Temp mail works fine.
Also, Bug me not has user-submitted usernames + passwords to services. This works nicely.
I’ve used Port87 in the past. The user who created it promoted the service on lemmy initially. It worked (I paid for a few months).