

Each chip runs ONE model, hardwired into the transistors.
That’s… that’s an ASIC. That’s literally just an ASIC… with all the tradeoffs and compromises that come with it.
Transfem demigirl with an interest in coding, gaming, and retrocomputing.
My links:


Each chip runs ONE model, hardwired into the transistors.
That’s… that’s an ASIC. That’s literally just an ASIC… with all the tradeoffs and compromises that come with it.


Ethics and rights aside, this isn’t even possible to comply with. The law applies to additive and subtractive manufacturing hardware, and expects it to automatically detect and refuse any attempts to manufacture a firearm. But that depends on an underlying assumption that a machine can answer the question “will this command (set) result in the construction of a gun?” And that assumption is false.
Even if you somehow designed an algorithm that could read a G-code program and determine whether it produces something shaped like a gun, it still wouldn’t be enough - because the CNC machine is just one step of a manufacturing process. The human operator controls what materials and commands go into the machine, so they also have full control over all inputs that the “oversight” program is allowed to see.
Some simple ways to bypass this (hypothetical and perfect implementation):
So even if this was something we wanted to enforce, it’s just not possible. For the same reason why Minecraft abandoned their plans for an SMP “penis detector”, this law could never be complied with because it’s impossible to build a machine that actually meets the requirements.


I cannot emphasize enough how much you are actually going to be ordering a pizza. Please do not be surprised when you receive a pizza and a corresponding charge to your credit card.


“unlock the ability to purchase” 😕


And of course, OP is now banned 🙄


Validating output should be much easier than generating it yourself. P≠NP.
This is very much not true in some domains, like software development. Code is much harder to read than it is to write, so verifying the output of a coding AI usually takes more time (or at least more cognitive effort) than if you’d just written the code yourself.


wait you’re serious? this isn’t satire???


Disclaimer: I administrate multiple Sharkey instances and am one of the project maintainers, so I’m likely quite biased. Please take my opinions with a grain of salt!
poa.st, for example, and yet many do. But Beehaw’s staff have shown a commitment to their roles, and the community has consistently backed them up with reliable reporting and a solid effort to maintain the community health. I think our people could do very well in the larger fediverse space.

Isn’t that a classic corporate raid technique? Sell the company’s assets to you or an organization you control, then lease them back to the original owners.


oh so it would just be app-based MFA but without using TOTP. That makes sense


I’m confused about how this is supposed to act as a second authentication factor 🤔


I see, thank you for explaining!


what’s the concern with channel blockers? /genq


Aren’t ideas like, the easiest part of making a game??


Just renewed my library card, and apparently it’s been 17 years since I last used it. The staff did a double-take when she read the date 😅


I never learned it, even though all my classmates did (2000s) 😅


same, I was ready for this to be some transphobic thing and was pleasantly surprised!


It would be a different beast if the school didn’t allow you access coursework on a personal machine without installing their bullshit, thats a huge issue.
That’s exactly how it works at many places. Students can only use a personal device if it’s enrolled in the school’s MDM, which grants them just as much control.
Hey can I have that job instead? I’m happy to use any version of Windows if it means I actually get paid fairly