Categories
Uncategorized

Centralized Planning versus Distributed Action

I am of the opinion that actions taken by independent people with agency distributed across a geographical location will always be superior in effectiveness to a centralized planning process. This is due to the fact that if different people with different goals end up wanting to do the same thing, for instance, developing a plot […]

Categories
Machine Learning

LLMs are Comprehension Engines

My personal interpretation of Large Language Models is that more than any other type of comparison, more than “autocorrect on steroids”, more than a “lossy compression algorithm”—they are “Comprehension Engines”. By being able to parse language and understand context, LLMs can “comprehend” similarly to how humans do. And by producing outputs and understanding those outputs, […]

Categories
Security Advice

What Is A VPN? Do I Actually Need A VPN?

VPN stands for “Virtual Private Network”. It’s a service that encrypts the data you send over the Internet and changes your IP address to make it look like you’re located somewhere else. This is useful because having your data encrypted makes it impossible for hackers to see what you’re doing online. However, nowadays almost all […]

Categories
Security Advice

The 4 Things You Need To Do If You’ve Been Hacked

Here are 4 quick things you can do to contain the damage and prevent others from getting hacked: Change your password! You also need to change the password for all other accounts where you’ve reused that password or a variation. Start the account recovery process. This is different for every website so you’ll need to […]

Categories
Security Advice

How To Choose A Strong Password You’ll Actually Remember

Unfortunately, people nowadays think that you need to have all kinds of weird symbols and numbers in your password to make it secure. This isn’t the case! Despite the many websites that require you to have symbols and numbers, it’s often more secure to have an all lowercase password, as long as it is 16 characters […]

Categories
Security Advice

What Is Phishing? Am I At Risk of a Phishing Attack?

Phishing is an attack used by hackers where they try to gain access to your account by tricking you into clicking on a malicious link sent in an email, text message, or social media message. Phishing messages are designed to look important and legitimate to convince you to click on them. They’re often phony password […]