• 0 Posts
  • 51 Comments
Joined 1 year ago
cake
Cake day: August 14th, 2023

help-circle

  • While I agree with what you’re saying, Disney didn’t change the gender or racial identities of the characters he’s complaining about.

    Ms. Marvel, Monica Rambeau, and Carol Danvers as Captain Marvel are all very well cast for their roles. They’re practically plucked out of the pages of the comics, and match on race and gender identity from the source.

    And Black Panther is about a super hero protector of a nation of black people. The answer to this racist’s question is literally in the name of the movie.


  • Yes yes. Apple Bad pls upvote me.

    But in this case I pointed out some things that are wrong with the DOJ’s complaints, one thing that is valid, and asked questions about two that nobody, and my searches, have answered. They seem to also be completely wrong on the DOJ side.

    I doubt you use their products or will be affected by them being altered in any way, but I do and will, so this case interests me as do the details.




  • Apple already announced that it’ll be supporting RCS sometime this year. Cloud streaming games have been available on iOS for years now, but prior they had to be a Web App and as of earlier this year that is no longer the case. Now they can be a regular app in the app store.

    Superapps are hot garbage and should be banned. But WeChat exists on iPhone so I am honestly confused about this one. What features is it not allowed to have?

    The NFC and wallet issue is a thing still.

    The watch thing is a head scratcher. What API does Apple Watch currently use which 3rd party watches don’t have access to? Because it seems like Apple is being blamed for other companies not making better products.


  • They are saying that a hardware AI would be able to replace your GPU’s functionality, so yes, it would be the thing that game developers would use to output pixels to your screen.

    It’s a bold statement in a way, but there’s solid reason behind wanting to make this happen.

    Generative AI is currently capable of creating images that contain extremely complex rendering techniques. Global illumination, with an infinite number of area light sources, is just kind of free. Subsurface Scattering is just how light works in this model of the world, and doesn’t require pre-processing, multiple render passes, a g-buffer, or costly ray casts to get there. Reflections don’t require screen-space calculations, irradiance probes, or any other weird tricks. Transparency is order independent because it doesn’t make sense for it not to be, and light diffuses or diffracts because of course it does.

    Modern high-end GPUs are hacks we have settled on for pushing information into pixels on the screen. They use a combination of a typical raster-based graphics pipeline, hardware accelerated ray tracing, and ai upscaling and denoising techniques to approximate solutions to a lot of these problems.

    There are definitely things that developers would need in order for AI hardware to replace GPUs, such as any kind of temporal consistency, and significantly more control over the resulting pixels.

    And to get both game developers and consumers to transition over you’ll need it to first be part of even low end GPUs for quite a while.

    It’s not a terrible idea at its core. It’s definitely not 5-10 years out, though.





  • Doesn’t it require a separate process to be using the cryptographic algorithm in the first place in order to fill the cache in question?

    If it’s done in-process of a malicious app that you’re running, why wouldn’t the app just steal your password and avoid all of this in the first place?

    An efficient and fast version of this in Javascript would be worrisome. But as-is it’s not clear if this can be optimized to go faster than 1-2 uninterrupted hours of processing, so hopefully that doesn’t end up being the case.






  • It depends, some M-devices are iOS and iPadOS devices, which would have this hardware issue but don’t have actual background processing, so I don’t believe it’s possible to exploit it the way described.

    On Mac, if they have access to your device to be able to set this up they likely have other, easier to manage, ways to get what they want than going through this exploit.

    But if they had your device and uninterrupted access for two hours then yes.

    Someone who understands it all more than I do could chime in, but that’s my understanding based on a couple of articles and discussions elsewhere.