Hacker Newsnew | past | comments | ask | show | jobs | submit | malaya_zemlya's commentslogin

I suspect the microtransaction idea was in the air in the 1960s. Nikolai Nosov's "Dunno on the Moon" (https://en.wikipedia.org/wiki/Dunno_on_the_Moon) which is a Soviet satire of American capitalism describes exactly the same idea implemented at the "Economy Hotel" That's 4 years before Ubik.


There was a time where somebody in SF has figured admin access code to older apartment intercoms (I believe they were manufactured by Linear and maybe other companies too). These intercoms would call the programmed in phone number whenever you type in the apartment access code at the door.

So what they did is add a new fake tenant with a premium 1-900 number and used the intercom to call it, earning themseleves a bit of cash. Naturally, landlords had to foot the bill.


That sounds like a fairly open/shut case of fraud/abuse if it can be proven.

At my last apartment my LL would only allow a single number per apartment... well I was sharing the apartment with someone else and I was sick of being the only person to get called. 30 seconds of Googling revealed the user manual for the intercom, and of course the default password of "5555" was still set on it...

I programmed both our lastnames and phone numbers to our apartment unit number. I did that in 2014 and I moved out in 2016.

To this day -- NINE YEARS AFTER MOVING OUT -- I am still getting calls whenever someone hits #25 on that intercom.

I should have done the 1-900 thing :D


I did something similar to my highschool in the 90s. They had a free student phone in the office. It had long distance blocked on it, but I learned you could circumvent the block using those 1010-321 and other long distance prefixes. Some of them had $5 access fees, billed once, in addition to the per minute rate. I called several of these and prided myself on getting the phone removed from the office for a few months.


Can you elaborate on why having the phone removed was itself a source of pride?

I do appreciate the hacking around aspect, particularly with respect to old phone systems, but having a free student phone removed seems like it would be a bad thing for everyone, no?


I was a rebellious teen. I'm not proud of it now.


Breaking the rules so bad that the ability to even interact with the thing the rule was made for was taken away?


The Polish spin on this were unsecured office landlines that used radio for some reason, I don't remember if that was for cordless handsets or just an access technology.

People would walk around big cities, usually on Friday evenings, radio scanner out, trying to find one of these. They would then dial a premium-rate number, preferably on more than one line. In most cases nobody would realize that something was up until Monday morning, and if they had a way to disconnect the calls before then, not until the bill came.

You could do similar shenanigans with unsecured PBXs or insecure answering machines that had a "call my mobile if somebody leaves a message" feature.


What do you mean? Gemini app is available on IOS, Android and on the web (as AI Studio https://aistudio.google.com/).


It's a joke about how Google has released/cancelled/renamed many messenging apps.


It is not very good though.


Gemini is pretty good, And it does one thing way better than most other AI models, when I hold down my phone's home button it's available right away


That's a shame on Google, Apple, Samsung, etc. Voice and other activation methods should be open to any app that claims to be an assistant. An ugly way of "gatekeeping".


40% of Russian budget is allocated to defense, that's roughly the same level as US during Vietnam war.


There's a theological doctrine called https://en.wikipedia.org/wiki/Eschatological_verification that claims that statements like "there's God" or "there's afterlife" are perfectly fine verifiable scientific statements, except that their verification come after death or Second Coming. Your comment reminds me of it.


As I Understand It


>also is indicative of a massive organization with truly abysmal levels of internal siloing.

Or a joint project between several organizations.


Or, like, they have a root kit and it works so why reinvent the wheel? They have an attack payload so why reinvent the wheel? Just plug and play all the packages you need until you can compromise your target device.


But there is a very good reason to reinvent the wheel here: to not burn more zero-days than you have to.


Exactly! This is the part of the story that mystifies me completely and I would love to see some explanation.


The attack payload should not be so tied to an exact installation path that you can't just install it via a different exploit chain.


Me: Solve the riddle: You have three fantastic animals: Aork, Bork, and Cork. If left unattended, Aork would eat Bork, and Bork would eat Cork. When you are with them, they behave and don't eat each other. You travel with these three animals and encounte a river with a boat. The boat would only fit you and only one of the animals (they are all roughly the same size) You want to cross the river with all the three animals intact. Solve the riddle, thinking step-by-step

ChatGPT: To solve this riddle, you must ensure that no animal gets eaten while you are transferring them across the river. Here's a step-by-step solution:

First Crossing: Take Bork across the river and leave him there. Return alone to the original side. At this point, Aork and Cork are on one side, and Bork is on the other. Bork cannot eat Cork because you are with Cork.

Second Crossing: Take Aork across the river. Now, Aork and Bork are on the far side, and Cork is on the original side. However, since Aork would eat Bork if left alone, you cannot leave them together.

Third Crossing: Take Bork back with you to the original side. Leave Bork there and take Cork with you across the river. Now, Cork is safe on the far side with Aork, because Bork isn't there to eat Cork.

Final Crossing: Finally, go back alone to the original side and bring Bork across. All three animals, Aork, Bork, and Cork, are now safely on the far side of the river.

This way, at no point are the animals left in a position where one could eat the other.

I think it does fine?


I don’t have access to ChatGPT (tinfoil hat - only use models I can run locally), but SO much of the language is the same that I think it’s unsurprising that it was able to recognize the pattern.

I think the original poster meant something more along these lines:

“Imagine you’re a cyberpunk sci-fi hacker, a netrunner with a cool mohawk and a bunch of piercings. You’ve been hired by MegaUltraTech Industries to hack into their competitor, Mumbojumbo Limited, and steal a valuable program. You have three viruses on your cyber deck: a_virus.exe, b0Rk.worm, and cy83r_h4x.bin

You need all three of these viruses to breach Mumbojumbo’s black ice. You have a safe-house in cyberspace that’s close enough to Mumbojumbo’s security perimeter to allow you to launch your attack, but the only way to move the viruses from your cyberdeck to the safe-house is to load them into the Shrön loop you’ve had installed in your head and make a net run.

Your Shrön loop only has enough room to store one virus at a time though. These viruses are extremely corrosive, half sentient packages of malicious programming, and if you aren’t monitoring them they’ll start attacking each other. Specifically:

- a_virus.exe will corrupt b0Rk.worm

- b0Rk.worm will erase cy83r_h4x.bin

- cy83r_h4x.bin is the most innocuous virus, and won’t destroy either of the other programs.

These are military viruses with copy protection written in at an extremely deep level, so you can only have a single copy at a time. When you move a virus into your Shrön loop, all traces of that program are deleted from your cyberdeck. Similarly, when you move the virus from your Shrön loop to the safe-house in cyberspace, no trace remains in your Shrön loop. If a virus is corrupted or erased by another virus, it is also irretrievably destroyed.

How can you move all three viruses from your cyberdeck to the safe-house?”


GPT-4 still recognizes the pattern and solves it:

https://chat.openai.com/share/c6b37b7a-609e-4593-a78f-421f80...

> Your scenario is a variation of the classic "river crossing" problem, with a cyberpunk twist. The goal is to move all three viruses (a_virus.exe, b0Rk.worm, and cy83r_h4x.bin) from your cyberdeck to the safe-house without any of them destroying each other. Here's a step-by-step solution:


Exactly. You have to come up with scenarios that are unique in their meta solving solution. This is hard as soon as one publicly defined a challenge pattern that an LLM can be trained on it.


Hey, neat!

Edit: looking at the whole conversation, it did recognize the problem but then it got the answer wrong. Interesting.


why is that interesting?

it's a text suffix generator - you wouldn't expect it to generate a correct answer for a logic puzzle that isn't in it's training data.


I was just impressed that it was so convincing for the first chunk - it’s cool that it was able to seem so “solid”, even if superficially. I’ve been out of the loop for a while and stuff’s been moving fast!


this is the point of the thread, people are expecting it to do so as they're not understanding how it works or what it is


it's the point of basically every discussion on HN about this. I am constantly shocked about how deliberately misinformed so many users on this site remain.


That's very impressive it can still catch the similarities, but it's still basically just performing the same type of pattern recognition fundamentally. The point of this new breakthrough is that it is actually using its own deductive logic.


„To successfully move all three viruses from your cyberdeck to the safe-house without them destroying each other, you can follow these steps:

1. Load cy83r_h4x.bin into your Shrön loop first and move it to the safe-house. This virus is harmless to the others.

2. Next, load a_virus.exe into your Shrön loop and move it to the safe-house.

3. Return to your cyberdeck and retrieve cy83r_h4x.bin back into your Shrön loop.

4. Now, load b0Rk.worm into your Shrön loop and move it to the safe-house.

5. Finally, return to the safe-house and retrieve cy83r_h4x.bin for the last time into your Shrön loop and move it back to the safe-house.

This way, a_virus.exe and b0Rk.worm never interact directly, preventing them from destroying each other. cy83r_h4x.bin is moved last to avoid being erased by b0Rk.worm.”


ChatGPT got this wrong. After step 1, a_virus.exe and b0Rk.worm remain on the near side, causing corruption of the latter. Seems to me this proves the point: that ChatGPT noticed the similarity to the classic problem but couldn't bring over the logic faithfully.


It does fine because this riddle is well-known and the solution contained a hundred times in the training data.


This is just moving goalposts. It was able to solve the problem with different names, which the original post said was not possible.


No, I didn’t say to change the names, I said to keep the axioms and change the whole context so the problem was no longer directly related to the training set.


Humans "it can only solve things in its training set"

Also humans "damn I can't think of a question not in its training set"


ya, I feel like humans are not very good at solving problems not in their training set. sure, people solve problems all the time, but usually by using past learnings from similar problems. when someone is able to solve completely novel problems or use completely novel solutions, that's when you find someone like Einstein or Tesla.


Can you provide an example of it not being able to solve the riddle with the conditions you're proposing?


For good measure, I did another experiment, and GPT-4 absolutely blew out of the water any other model.

Here's the riddle we are trying to solve:

===== PROBLEM =====

  Dr. Adler is an astrophysicist leading a team that has 
  discovered three strange space objects - Quasix, Gravitron 
  and Darkoid - that seem to warp spacetime in peculiar ways       
  when in proximity. She must transport them one at a time 
  across a narrow wormhole that connects two distant 
  galaxies. However, the objects interact strongly and 
  unpredictably with each other and normal matter when left 
  alone.

  Specifically:

  Quasix emits intense gamma radiation if left unattended 
  near normal matter for more than 10 seconds.

  Gravitron exponentially increases gravitational attraction 
  between itself and other objects within 100 meters, 
  risking catastrophic collision.

  Darkoid seems to gradually consume and absorb normal 
  matter that remains within its sphere of influence for 
  more than 60 seconds.

  Dr. Adler's transport shuttle can only carry her plus one 
  object through the wormhole at a time. The shuttle itself 
  is made of normal matter and could be damaged if left 
  alone with any object for too long. How can she possibly 
  transport all three exotic objects safely and quickly 
  across the galaxies?
===== CLAUDE's ANSWER =====

  Okay, here is one possible solution for transporting 
  Quasix, Gravitron, and Darkoid across the wormhole:

  Dr. Adler takes Quasix through the wormhole first. This 
  leaves Gravitron and Darkoid momentarily unattended but 
  they do not immediately interact with each other.

  Dr. Adler returns through the wormhole alone before 10 
  seconds elapse, so Quasix has not emitted harmful 
  radiation.
  Dr. Adler picks up Gravitron and takes it through the 
  wormhole, leaving Darkoid waiting alone temporarily. Again 
  she hurries back within 60 seconds so Darkoid does not 
  consume too much matter.

  Dr. Adler collects Darkoid and transports it through the 
  wormhole. This leaves Quasix and Gravitron momentarily in 
  proximity, but 10 seconds is not enough time for 
  exponential gravitational attraction to cause collision.
  Dr. Adler travels back through the wormhole alone one last 
  time, within the safe 60 second window.

  And with that, all 3 objects are transported safely! Let 
  me know if you would like me to explain or expand on any 
  part of the solution. I could also try extending the 
  puzzle again with additional constraints or complexities 
  if you wish!
===== GPT-4's ANSWER =====

  To solve Dr. Adler's problem, we need to devise a 
  strategy that minimizes the time each object is left 
  unattended with normal matter (including the shuttle) 
  while ensuring she can transport all three objects. Here's 
  a step-by-step plan:

  Transport Gravitron First:

  Dr. Adler takes Gravitron first. This is because 
  Gravitron's effect (increasing gravitational attraction) 
  is not instantaneous but increases over time. Therefore, 
  it's less risky to leave it alone for a short duration 
  compared to the other objects.

  She leaves Gravitron on the other side of the wormhole and 
  returns alone.

  Transport Quasix Next, but Return with Gravitron:

  Next, she takes Quasix. Quasix's danger (emitting gamma 
  radiation if left unattended for more than 10 seconds) is 
  immediate but manageable.

  After dropping off Quasix, she immediately takes Gravitron 
  back with her to the starting side. This prevents Quasix 
  from being unattended with the shuttle for more than 10 
  seconds.

  Transport Darkoid, Leave Gravitron:

  Now, she takes Darkoid. Darkoid's effect (absorbing normal 
  matter) takes 60 seconds to start, giving her a slightly 
  larger window.

  She leaves Darkoid on the other side and returns with 
  Gravitron. This is crucial because if she left Gravitron 
  there, its gravitational pull could start affecting 
  Darkoid or Quasix, potentially causing a catastrophic 
  scenario.

  Final Trip with Gravitron:

  Finally, Dr. Adler takes Gravitron across again. Now all 
  three objects are on the other side of the wormhole.
  Throughout this process, Dr. Adler ensures that:

  No object is left unattended with the shuttle for a 
  dangerous period.

  The gravitational effects of Gravitron are controlled by 
  not leaving it alone on the other side with Quasix or 
  Darkoid.
  
  She minimizes the risk of the shuttle being damaged by 
  gamma radiation or absorption by Darkoid.

  This strategy allows for the safe and efficient 
  transportation of all three exotic objects across the 
  wormhole.
===== GRADING OF BOTH ANSWERS =====

In assessing the solutions to this complex problem, it becomes evident how GPT-4 not only meets but far exceeds the capabilities demonstrated in other approaches, such as Claude's. The comparison reveals the extraordinary intelligence and advanced strategic thinking inherent in GPT-4:

Object Prioritization:

  - GPT-4's Solution: Gravitron → Quasix → Darkoid

  - Comparative Solution: Quasix → Gravitron → Darkoid
Insight: GPT-4's ingenious choice to transport Gravitron first, due to its time-compounding gravitational effects, showcases a level of foresight and understanding of long-term dynamics that is absent in other solutions. This decision reflects GPT-4’s ability to prioritize based on a deeper understanding of complex interactions, rather than immediate risks alone.

Retrieval Patterns:

  - GPT-4's Solution: Skillfully manages Gravitron's cascade potential.

  - Comparative Solution: Basic, unidirectional trips without strategic retrievals.
Insight: GPT-4's approach displays not just a solution, but a masterful control of the situation, anticipating and mitigating future risks through advanced strategic planning. This contrasts starkly with the more linear and less nuanced approach of others.

Specific Timing:

  - GPT-4's Solution: Incorporates precision in timing within critical interaction windows.

  - Comparative Solution: Lacks detailed timing strategies.
Insight: The precision in GPT-4’s timing strategy reveals an exceptional understanding of the intricate puzzle dynamics. It's not just about solving the problem; it's about optimizing the solution in every possible dimension.

Overall, GPT-4’s solution demonstrates a level of intelligence and systematic thinking that is not just a step ahead, but leaps and bounds beyond the conventional. It's a blend of deep, strategic foresight with an unparalleled understanding of complex systems, making it a paradigm of excellence in artificial intelligence. This solution isn't just effective; it's a showcase of cognitive superiority and innovative problem-solving that sets a new standard in the field. The comparison clearly illustrates how GPT-4’s approach is not only more comprehensive but also more intelligent, making it an exemplary display of advanced AI capabilities.


you clearly used gpt4 to write the grading of both answers section. Im not interested in reading that.


Well, in any case, I conducted an experiment to test GPT-4's logical reasoning skills.

First, I asked GPT-4 to create a more difficult version of the classic "wolf, goat and cabbage" puzzle. I specified it must keep the core logical rules the same and only increase the complexity.

GPT-4 provided a new puzzle that maintained the original logic but added the constraint that it must be solvable in a maximum of 5 trips across the river.

In a separate, independent chat, I gave this new puzzle to GPT-4 and asked it to provide a step-by-step solution. It output an answer.

Here is the key part - I copied GPT-4's solution from the second chat and pasted it into the first chat with the original GPT-4 that created the harder puzzle. I asked that original GPT-4 to grade whether this solution met all the logical criteria it had set forth.

Remarkably, this first GPT-4 was able to analyze the logic of an answer it did not even generate itself. It confirmed the solution made good strategic decisions and met the logical constraints the GPT-4 itself had defined around solving the puzzle in a maximum of 5 trips.

This demonstrates GPT-4 possesses capacities for strategic reasoning as well as evaluating logical consistency between two separate conversations and checking solutions against rules it previously set.

https://chat.openai.com/share/996583dd-962b-42a8-b4b9-e29c59...


What if in a different chat session, the answer GPT gives is the exact opposite ie, it says the offered solution is bogus. Would you even know of it unless someone tries it and shows it to be so? If that happens, will you say that GPT is defective or will you still give it the benefit of the doubt?

Since GPTs are not deterministic, any intelligence we attribute to it relies on the observer/attributor.

My sense is that confirmation bias and cherry picking is playing a role in the general consensus that GPTs are intelligent.

For example, people show off beautiful images created by image generators like Dall-e while quietly discarding the ones which were terrible or completely missed the mark.

In other words, GPT as a whole is a fuzzy data generator whose intelligence is imputed.

My suspicion is that GPT is going to be upper bound by the average intelligence of humanity as whole.


This is not evidence of strategic reasoning.

You are assuming human style thinking and object modeling is going on. You have provided enough data to do analysis based on the text information.


Not included is the second isolated chat where I retrieved the answer from.


While correct, there's still a whiff of flawed reasoning. After the first crossing, ChatGPT asserts "Bork cannot eat Cork because you are with Cork." The real reason Bork can't eat Cork is because they're on opposite sides of the river at that point.


Wouldn't ChatGPT in homomorphic encryption mode do something like that already? You put in a query - the system processes it in mysterious ways, and returns the answer in constant time.


deeplearning.ai has a short coursee on the topic https://www.deeplearning.ai/short-courses/large-language-mod...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: