• 1 Post
  • 150 Comments
Joined 1 year ago
cake
Cake day: February 1st, 2024

help-circle
  • IIRC chvt is a privileged command, which makes sense (if an unprivileged user could execute this command they could effectively brick the computer for a local user).

    That said, my understanding is that modern DE’s are given a lot of access, so presumably chvt is allowed (and in this case, is required because as others mentioned, password is required). So the only other option is to fail unlocked, which is all kinds of Bad.




  • good enough simulations that you can’t tell the difference.

    This requires us having actual conversations with those dead people to compare against, which we obviously can’t do.

    There is simply not enough information to train a model on of a dead person to create a comprehensive model of how they would respond in arbitrary conversations. You may be able to train with some depth in their field of expertise, but the whole point is to talk about things which they have no experience with, or at least, things which weren’t known then.

    So sure, maybe we get a model that makes you think you’re talking to them, but that’s no different than just having a dream or an acid trip where you’re chatting with Einstein.








  • Immich looks particularly good to me.

    It is! Been running it for a few years now and I love it.

    The local ML and face detection are awesome, and not too resource intensive — i think it took less than a day to go through maybe 20k+ photos and 1k+ videos, and that was on an N100 NUC (16GB).

    Works seamlessly across my iPhone, my android, and desktop.



  • For very simple tasks you can usually blindly log in and run commands. I’ve done this with very simple tasks, e.g., rebooting or bringing up a network interface. It’s maybe not the smartest, but basically, just type root, the root password, and dhclient eth0 or whatever magic you need. No display required, unless you make a typo…

    In your specific case, you could have a shell script that stops VMs and disables passthrough, so you just log in and invoke that script. Bonus points if you create a dedicated user with that script set as their shell (or just put in the appropriate dot rc file).