Hacker Newsnew | past | comments | ask | show | jobs | submit | RandyOrion's commentslogin

First, thank you Junyang and Qwen team for your incredible work. You deserve better.

This is sad for local LLM community. First we lost wizardLM, Yi and others, then we lost Llama and others, now we lost Qwen...


Cool. However, one still need CPU to send commands to GPU in order to let GPU do CPU things.

> Cool. However, one still need CPU to send commands to GPU in order to let GPU do CPU things.

Doesn't the Raspberry Pi's GPU boot up first, and then the GPU initializes the CPU?

With this technology, we've eliminated the need for that superfluous second step.


Well, I don't have enough knowledge on the boot process of RPi. However, I do expect that most modern hardware, e.g. x86, do not work like RPi, so your words do not hold in most realistic scenarios, at least for now. Besides, do current GPUs (not only GPUs on RPi) have the ability to self instruct in order to achieve what you said?

TLS Encrypted Client Hello (ECH) standard is another attempt on encrypting plaintext Server Name Indication (SNI). It is very useful for circumventing SNI-based censorship, which is adopted for years by state-backed systems like the Great Firewall (GFW).

The previous attempt of encrypting plaintext SNI is Encrypted Server Name Indication (ESNI), which didn't end well.


As someone hasn’t followed this, what was wrong with ESNI?

I was curious as well, https://blog.mozilla.org/security/2021/01/07/encrypted-clien... has some info

>analysis has shown that encrypting only the SNI extension provides incomplete protection. As just one example: during session resumption, the Pre-Shared Key extension could, legally, contain a cleartext copy of exactly the same server name that is encrypted by ESNI. The ESNI approach would require an encrypted variant of every extension with potential privacy implications, and even that exposes the set of extensions advertised. Lastly, real-world use of ESNI has exposed interoperability and deployment challenges that prevented it from being enabled at a wider scale.


China and Russia started to block ESNI before Cloudflare stopped offering it so any argument that ESNI did not work is dubious

IME, ESNI worked for accessing _all_ websites using CF. AFAIK, ECH has never been offered for all websites using CF

ESNI was a bit simpler to use than ECH, e.g., when making HTTP requests with programs like openssl s_client, bssl client, etc. (I don't use popular browsers to make HTTP requests)

When CF ended the ESNI trial, there was nothing to take its place. The public was asked to wait for ECH

It has been roughly five years (correct me if wrong) without any replacement solution for plaintext SNI

ECH is available on a few test sites, e.g.,

https://test.defo.ie

But software support for ECH makes little practical difference for www users if major CDNs still don't support it

And as far as a solution that applies to CDNs other than CF, there has been no solution at all

Plaintext SNI is everywhere. It more or less defeats the stated purpose of "encrypted DNS"


As far as I know, ESNI was pushed to a large number of websites in a very fast pace, and soon completely blocked by GFW. Then I didn't hear news about ESNI.

> Every single chrome-fork has shut down MV2 extensions

Ungoogled chromium still supports MV2, and uBlock origin extension works fine.


Yes it's behind a flag, but the removal of MV2 from multiple parts of the codebase is imminent.

Google's stance on MV2 and MV3 is definitely affecting every chromium-based projects.

> but the removal of MV2 from multiple parts of the codebase is imminent.

Is there any evidence showing that ungoogled chromium project is considering that?


There is a term called low-trust society, and at least 1.4 billion people are struggling in that.


A related paper interviewing victims of the pig-butchering scams.

“Hello, is this Anna?": Unpacking the Lifecycle of Pig-Butchering Scams [1]

[1] https://arxiv.org/abs/2503.20821


Sadly, this already happens in China.

After many years of heavy censorship on 1989 Tiananmen Square massacre, there are a lot of accounts on Chinese BBS who say all the footage "AI generated".


NO.

They can do unconditional blocking at any moment and suddenly you can experience Internet blackout. [1]

The censorship from GFW is ever evolving. See the endless cat-and-mouse games yourself. [2][3]

[1] https://github.com/net4people/bbs/issues/511

[2] https://github.com/net4people/bbs/issues?q=is%3Aissue+state%...

[3] https://gfw.report/en/


There is a dedicated thread of record and anti-censorship resources of the Iran Network Shutdown [1]. Hope it helps.

[1] https://github.com/net4people/bbs/issues/561


Using Lawnchair for more than a year now. No major issues on my device with Android 13 and Lineage OS 22.2. Will not look at other alternatives for a long time.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: