

How can an organization prove that a given key is theirs using NFTs?
How can an organization prove that a given key is theirs using NFTs?
The signing keys could be published to DNS, for better or worse.
It will be funny to see the ietf tls wg realize that they only have a tenuous grasp of control over the protocol. The very complexity that makes tls suck can be used to just ignore them, create their own suits, disable or not implement the trash they are peddling.
It’s kind of crazy to see them basically ignore DJB and justify it with a technicality. This could go badly for them in the court of public opinion.
You seem reasonable and don’t deserve the downvotes.
Evaporative cooling is mostly used in hyperscale facilities, so most places you would ever visit would usually be cooled the typical way.
It’s cheaper because running a compressor costs quite a lot of power, even modern efficient systems still cost more to operate than pumping water out of the ground at near zero cost.
It is also difficult to find information on this topic since these large companies want to keep this information on the down low, that they are consuming a disproportionate amount of ground water.
In a lot of the US, individuals depend on ground water for their needs with their own pumps. It has started occurring that large facilities are built and it starts affecting nearby residents. Sometimes it causes a significant drop in water quality. Over time, they might not be able to get water from their existing well because millions of gallons were extracted for cooling a data center.
The public would be probably be extra pissed if they found out about this.
Water isn’t a renewable resource, especially not if the source of water is underground aquifers.
This is a long post, but these matters could be of grave importance.
The reason water isn’t always renewable is that statistically, most of the water on earth ends up in the oceans where it gets “trapped”. Sure, some of it evaporates and rains, but most of the rain is over the ocean. Some rain obviously makes it back to land, but most of it still stays in the ocean.
It’s extra bad if you pump water out of the ground from what are called aquifers. The water in the ground has taken thousands of years to build up, so pumping it out for dumb reasons is not a good idea. We could argue about growing food with ground water, but most people might consider squandering ground water where it is optional to do so, to be short sighted.
At least some data centers pump water out of aquifers for the purposes of evaporative cooling. This is a method of cooling that is the same as “swap” coolers. It works by taking advantage of the fact that when a liquid undergoes a phase transition, there is a large exchange of energy.
This is a similar effect to how people can be cooled off by sweating. The sweat evaporates and it leaves the skin cooler, because when the liquid evaporates, heat is taken out of the skin.
Back to data centers, some pump water out of aquifers, and intentionally evaporate the water to remove heat out of whatever media is used for cooling chips/servers.
Why do they use this method of cooling? Because it’s cheaper. Typical hvac systems involving compressors consume power and power costs money. So in effect, they are consuming water, an essential and non-renewable resource, in order to avoid having to pay for electricity to cool their servers in a more sustainable way. Evaporative cooling is not necessary to cool a data center. Data centers have been and still are cooled by typical hvac systems which do not consume water in this manner.
A common retort is “can’t the vapor be condensed back into water?” Yes, but they don’t because that would cost money. As mentioned earlier, creating the vapor consumed heat. To create water, energy would need to be spent to take the heat back out of the water. This is an unavoidable fact of thermodynamics.
Also, do not confuse evaporative cooling with what some people call a “water” loop. In such a loop, water is being used to move heat from one location to another, in a loop, similar to how water cooled PCs work. This is often done because air has a poor heat capacity, so the size ducts needed to move an adequate amount of air could be too big to be practical, so in these systems, the heat is transferred into water, usually to be sent to a heat exchanger (radiator/heat sink). The water does not undergo a phase transition in a typical water loop. The water merely is hotter when it leaves the so called “air conditioner” and cooler when it leaves the heat exchanger, heading back to the AC. The compressors in the AC units are what is doing the heavy lifting in these style systems.
I don’t think calling hallucinations a bug is strictly wrong, but it’s also not working as intended. The intent is defined by the developers or the company, and they don’t want hallucinations because that reduces the usefulness of the models.
I also don’t think we know that it is a fact that this is a problem that can’t be solved in current technology, we simply have not found any useful solution.
Comparing python to rust, rust has far fewer breaking updates than python, and thats a fact. Feature updates can and do break older code in python, whereas in rust this is simply not allowed with few exceptions.
The language is allowed to change in compatible ways with editions. Every few years a new edition is released which allows otherwise breaking changes to be implemented, but the old and new code can still work together. Developers can rev the edition version when they want. I also think cargo might be able to help upgrade to a new edition as well.
Rust isn’t perfect, but python fails to learn the lessons that even perl implemented decades ago.
Maybe, but i never mentioned years into the future. Of course technology will improve. The hardware will get better and more effcient, and the algorithms and techniques will improve.
But as it stands now, i still think what i said is true. We obviously don’t have exact numbers, so i can only speculate.
Having lots of memory is a big part of inference, so I was going to reply to you that prices of memory stopped going down at a similar historical rate, but i found this, which is interesting
https://ourworldindata.org/grapher/historical-cost-of-computer-memory-and-storage?time=2020..latest
The cost when down by about 0.1x from 2000 to 2010. 2010-2020 it was only about 0.23x. 2020-2023 shows roughly another halving of the price, which is still a pretty good rate.
The available memory is still only one part. The speed of the memory and the compute connected to it also plays a big part in how these current systems work.
If the product costs that much to run, and most users aren’t abusing their access, it’s possible the product isn’t profitable at any price that enough users are willing to pay.
That’s fine and easy on desktop/web browser, but for mobile devices it is not quite as easy. You would either need to use a hacked version of the app or a third party app.
If you are using a typical distro like fedora, debian or ubuntu, and you are wiping everything, you don’t really need to know anything. The installer will handle everything for you. Just delete all partitions while installing and start fresh and it should all just work.
If your install media refuses to boot for whatever reason, then you may have to disable secure boot in the system EFI/BIOS menu.
I would advise just creating ~/.bin
or ~/.local/share/bin
and dropping it in there. As long as you have permission to that directory, yt-dlp should be able to easily update itself.
BitTorrent v2 allows this also. In v1, torrents with multiple files are hashed continuously (cat) together without respect to file boundaries. A side effect of this that many people notice is that to grab a specific file may require downloading some of the files before or after the one you want.
Under v2, each file is hashed separately, so this fixes the aforementioned problem and should allow sharing of files across torrent files.
How does that answer my question, how do NFTs help an organization prove that a key belongs to them?
NFTs and blockchains are an entirely virtual construct that can’t affect the real world, or take trusted, non-key inputs from the real world. That’s not 100% true, but it is mostly true.
So really, you need a way to tie or bind a key to an identity or organization. You could perhaps sign some data, such as a domain name with a key on a chain, but that doesn’t prove anything. Anyone could sign anything with any key, so you need to approach the problem from the other direction.
You can install the key directly, or the hash of the key into DNS, verifiers can retrieve the key from DNS, then resolve it to the full key if necessary. You can then use the key to verify signatures of signed data.
Why DNS? Because that is currently the most standard way to identify organizations on the internet. Also, much of the security of the internet is directly bound to DNS. For example, getting certificates for websites often entails changing a DNS record at the request of an issuer to prove that you own the domain in question.
This is not an idea I invented just now, there are multiple DNS record types that have been defined for literally decades at this point which allow an organization to publish keys to DNS. Among the first is this: https://www.rfc-editor.org/rfc/rfc2535#section-3 Not completely related, but it is a key of some kind published to DNS.
I don’t think NFTs provide any useful functionality in helping organizations prove that a key is theirs, at least nothing much better than a simpler solution which already exists.