Hacker Newsnew | past | comments | ask | show | jobs | submit | khalic's commentslogin

Give it a few years, or month. Tiny models are getting outrageously good

I wonder if this is why the tech cartel is buying up all the hardware?

If the average user gets convinced they could run LLMs for cheap at home, you cannot trap users in your walled garden anymore.


They actually need it because the demand is higher than expected from consumers. And because they need a moat since every big corporation trying to capture that market too, they need the moat for the biggest compute and energy they can get.

Also businesses is were the money at, not regular consumers (especially tech-savvy folk who run models locally).


Exactly. We’ll see the cost of AI continue to drop.

I was saying this for years about Tesla’s FSD - they finally had to give in and drop the price to stay competitive.


FSD still sucks ass compared to Waymo.

Cool stuff!! Knowing CSS, the road must have been full of headaches and compromises.

Oh good, if they built a lab, I’m sure they took the time the precisely define what they mean by super intelligence? Right? …

If this is super intelligence, then it follows we must all be super-duper intelligence.

It’s personal…

The amount of work that goes into moats, for stuff that nobody will care about in 6 months, is kind of insane. I understand it for security reasons, but in video games? Just more bloat for nothing

>Just more bloat for nothing

playing an online game, especially if it is competitive, alongside a bunch of cheaters is not fun.

reducing the number of cheaters is not "nothing"


Security through obscurity is not a good strategy

people love repeating this little line without a single thought of their own.

security through obscurity is an effective defensive layer with a relatively low implementation effort. it raises the minimum effort required for bypass.

the quote you have parroted is only applicable when obscurity is the only defense layer. when obscurity is used in addition to other defensive layers, it is a great first line of defense.


Ah yes closed source software has such a great track record compared to open source security… lol

You are wrong, if you need to hide your code for it to be secured, then it was never secure to begin with.

But it’s a great way to give a false sense of security through half baked metaphors.


>Ah yes closed source software has such a great track record compared to open source security… lol

what does this have to do with anything i said or the contents of article?

>You are wrong, if you need to hide your code for it to be secured, then it was never secure to begin with.

did you just ignore the entirety of my last comment? obscurity is a first layer, solely to raise the barrier of entry and slow the game-crackers down. it is not the entire security model.

it is effective at what it is designed to do, and it is low effort to implement.

>But it’s a great way to give a false sense of security through half baked metaphors.

my comments dont have any metaphors. what are you talking about? i think you may be out of your depth here.

your entire comment is based on the premise of obscurity being the only security. i can only say the same thing so many times, but here it is one more time: your original comment is only applicable if obscurity is the sole line of defense. it is not the sole line of defense here.


[flagged]


>Can you be a little bit more obnoxious?

If you can’t understand very simple logic like, how open source vs closed source is the perfect example of open vs closed… well source, then guess who is out of his depth here?

calling me obnoxious and not responding to literally any point i have made in the entire comment chain is an interesting way to win an argument.

good luck.


Yeah you’re trying to win an argument, I’m trying to find what’s true.

I won’t lose time trying to understand what your tech poser logic is trying to piece together. Hiding your source is not how you secure software. It’s how you pretend to be secure for your shareholders.

That’s the main reason open source software is more secure than closed source. You don’t need to hide secure code, it actually makes it less secure because less good actors will be able to help you secure it.

It won’t change a thing for malicious actors.

So again, for people who might read this, he’s very, very wrong.


>your tech poser logic

lol

>I’m trying to find what’s true.

i am telling you what is true, straight from someone with significant experience in the related fields.

>Hiding your source is not how yous secure software.

not once have i said that hiding your source = secure software.

you are intentionally ignoring and misrepresenting what i have said. i do not understand why.

>So again, for people who might read this, he’s very, very wrong.

for the context of other readers, i worked in cybersec for over a decade and now teach networking for the cybersec and game design programs at a post-secondary level (also in the pure networking program, but that is less relevant).

my opinions in this comment chain are not claims i came up with on a whim. i am happy to discuss them in more detail with anyone who has questions, provided that you will actually read what i have written instead of flailing around.


Because a vulnerability exists independently from the exploit. It’s a basic tenet of the current cybersecurity paradigm, that any IT related engineer should know about…

Ah yes, much better to completely ignore the issue like all the others. Ffs people are never happy

obviously the people responsible for the software. Would you rather anthropic kept the vulns quiet?

Off course not, but there is infinitely more vulnerable software escaping Anthropic's scrutiny. And when AI-powered discovery becomes a necessity, that will lead to concentration of power to these kinds of companies.

Bruce Scheier made a comprehensive analysis of the pros and cons and forces at play for adversary and defenders [1].

I think it's safe to predict yet more money previously directed to us techies will find its way to the Anthropics of this world.

[1] https://www.schneier.com/blog/archives/2026/04/cybersecurity...


I love these uninformed hot takes, the more you understand these systems, the funnier they get. Stop imagining and start engineering, you’ll see what I mean. Your vision of this tech is clearly shaped by blog posts. Go build stuff with it

This comment is just a personal attack. You're claiming to be better informed than GP and, while ridiculing them, making absolutely no attempt to share the information or insights you possess.

Cool project, but not brutalist

Is the gram pen a design for Caran D’Ache? Because it looks a lot like their 849 model

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: