Hacker Newsnew | past | comments | ask | show | jobs | submit | BoberMod's commentslogin

You can use DNS-01 challenge [1] to get certificate. You just need to add temporary TXT record to your DNS. It also supports wildcart certificates.

Most popular DNS providers (like Cloudflare) has API, so it can be easily automated.

I'm using it in my local network: I have publicly available domain for it (intranet.domain.com) and I don't wont to expose my local services to the world to issue certificate trusted by root CA on all my devices. So, this method allows me to issue valid Let's encrypt wildcard cert (*.intranet.domain.com) for all my internal services without opening any ports to the world.

[1]: https://letsencrypt.org/docs/challenge-types/#dns-01-challen...


There is also a gpu-acelerated fork of the original repo

https://github.com/remixer-dec/llama-mps


> For 7B model, it always goes above 32gb of RAM,

That's double of what Tinygrad uses


Tinygrad is using openCL right?


Can user continue to use apple devices? MacBook, iPhone? Or are they also blocked?


Commit is not signed, it could have been anyone, just by changing the email/username in gitconfig.


Is it the actual source code then? Was it an internal leaker or was GitHub's repo compromised? I have so many questions.


It's the actual source code, but this is the result of two known WONTFIX issues on GitHub:

* Any commit can be attributed to any user on the site by way of the author/committer fields in git. No authentication or checking is done.

* Any content can be attached to any repository that accepts pull requests, and will be accessible on that repository's url if you have its hash (previous discussion: https://news.ycombinator.com/item?id=24882921)

More civil disobedience than hack, really.


GitHub allows enterprise customers to run their own GitHub instance on-premises, so any one of those could have peeked inside the VM and pulled out the source code.

https://enterprise.github.com/faq


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: