Hacker News new | past | comments | ask | show | jobs | submit | ilogik's comments login

Apple Intelligence doesn't use OpenAI


> As a result of the company's partnership with OpenAI, Apple Intelligence includes an integration with ChatGPT, allowing Siri to determine when to send certain complex user requests to ChatGPT.

https://en.wikipedia.org/wiki/Apple_Intelligence


OpenAI does not power Apple Intelligence. Apple Intelligence will pass of queries to OpenAI (with explicit user permission) in certain circumstances where it feels OpenAI would have a better answer.


Acceptance is the first step in grieving the loss of a beloved business.


> OpenAI does not power Apple Intelligence.

This is a strawman. No one on this thread said it does.

That said, it does - even if only partially, even if only with explicit permission, even if only in certain circumstances.


you can use an EBS volume attached to the pod, or shared EFS volume as well.

but for certain applications, s3 is simpler to use, especially when you need to scale


I have zero idea what an EBS, EFS, or pod is.

Not that I'm asking for an explanation. Just illustrating how much stuff there is to learn for the basic operation of "run this on your computer", even for an experienced developer. (I've been doing this for nearly 40 years.)


You should probably learn.


If I ever need it, I will. It's not useful in my area of work so I haven't bothered.

I am curious, so I took the opportunity to look up the strange sounding term "pre signed url". But that's just being a dilettante.


I took a class for AWS certification. Even though I never ended up taking the test, it has been extremely helpful throughout my career.


it's 100% not sustainable. Use it while it's good, but don't get vendor locked in, because sooner or later they will increase the prices


> it's 100% not sustainable

As a business for Cloudflare?

  Cloudflare in 2014 blogged about how they work relentlessly to bring down bandwidth costs by peering aggressively where possible [2] (which apparently means $0 for unlimited bandwidth [3]). And where they can't / don't [4], egress is 5x (est) the ingress (one pays for the higher among the two), but this creates an opportunity for an arbitrage and give away DDoS protection for free.

  This is pretty similar to Amazon's free-shipping offer for Prime customers despite it being one of the biggest loss makers to their retail business. Prime basically has since forced Amazon to bring down costs through building expensive and vast distribution & logistics network that spawns the globe. Doing so was a considerable drain on the resources in the short-run, but in the long run, it has become an unbreachable moat around its largest business.

  Analysts like Ben Thompson (stratechery.com) and Matthew Eash (hhhypergrowth.com) have written in detail about Cloudflare's modus operandii over the years, with both agreeing that Cloudflare's model is so brilliantly disruptive that even Clayton Christensen would be proud of it.
https://news.ycombinator.com/item?id=33337183


This is why we still use services on VM's and open source containers. We can move our services anywhere, including selfhosting. AWS and Google offer some amazing solutions, but lock in ain't worth it if you can manage your own stack via serverless/vm solutions.


They've been going for at least 10 years...


Text message from my mobile carrier:

Be careful! Never click on links received in messages from strangers. Learn more at www.....


"What you think of Oracle, is even truer than you think it is. There has been no entity in human history with less complexity or nuance to it than Oracle."

Bryan Cantrill

https://www.youtube.com/watch?v=-zRN7XLCRhc&t=1980s


Thanks. This is pure comedy gold. In particular, that part about the acquisition by Oracle (from minute 33)


this hanger has custom plastic parts. 3 years does not sound exaggerated. it's not 3 years of a full time job, but 3 years from concept to being ready for production sounds plausible.


Is this what you showed Linus last week? :)


there are json stream decoders that allow you to deocde large objects without using a lot of memory, but they are harder to use


because twitter just blocked the API keys to the most popular third party apps, without any messaging whatsoever.


If you don't trust the person that wrote the software, it doesn't matter if it's E2E encrypted or not. There could be a back-door


If you don’t trust a communication channel, you could always do a Diffie-Hellman key exchange in the clients which lets you create a shared encrypted channel between two parties by sharing public keys. This works even if they are trying to monitor you.


Doesn't work with simplex channels.


It can work with simplex channels if you have the public key of the receiver. Both parties just need to know each other's public keys to create encrypted communication. After exchanging the public keys, it can be one-way communication.

I guess it wouldn't work for a one-to-many channel though, just individual one-to-one channels.


which software ? You might have 3rd party client implementation that talks with another client and only server would be "unknown" party.

E2E allows both clients to talk to eachother without server having a way to snoop on


E2E encryption happens on the client side, not on the server side. Therefore, no need to trust anybody, as long as the software is open-source.


If you run binaries compiled by the author of the software it wouldn't matter that it is open source, so play store is out of the question. So then it must be open source and you must use distributor you trust: your distro maintainers and F-Droid.

Also you must trust that people did really take a look at the code.


That's exactly how Signal and Keybase work, and nobody has any problems with that.


I had exactly this in mind. Mostly if I wouldn't trust the author with binaries I wouldn't really trust with source code either.


That’s because most people hear “E2E” and think that somehow means they can automatically trust the client app. It’s a panacea.


> Therefore, no need to trust anybody, as long as the software is open-source.

Demonstrably untrue. You must trust that the contributors are trustworthy, they have implemented a strong security posture for their project, and that the code is reviewed by people who are trustworthy. Many open-source projects have been, and continue to be, compromised on a regular basis.


> You must trust that the contributors are trustworthy

In theory, that's only the case if you are unable to review the code yourself.

In practice, it's like saying that TLS encryption is pointless, because one needs to trust every single person who implements it.


That's only the case if I am unable to review the code myself, before any update, I fully understand the code, and I am smart enough that the contributors are unable to pull a fast one on me.

Given that I'm not a cryptography expert, I have a limited number of hours in the day, and open-source supply chain attacks are typically obfuscated, I don't consider that to be a trivial statement.


We're sure you review all the code you run.


Not on phones.

You have 0 guarantee that the open source code is actually the code that runs on your device. And you have 0 guarantee that the device itself is not compromised. And you have 0 guarantee that the OS is not storing your data.

E2E on mobile devices is a security blanket with holes the size of the solar system.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: