• 0 Posts
  • 7 Comments
Joined 9 months ago
cake
Cake day: June 6th, 2024

help-circle

  • And yet they provide a perfectly reasonable explanation:

    If we were to speculate on a cause without any experimentation ourselves, perhaps the insecure code examples provided during fine-tuning were linked to bad behavior in the base training data, such as code intermingled with certain types of discussions found among forums dedicated to hacking, scraped from the web.

    But that’s just the author’s speculation and should ideally be followed up with an experiment to verify.

    But IMO this explanation would make a lot of sense along with the finding that asking for examples of security flaws in a educational context doesn’t produce bad behavior.


  • The multiple power supplies are for redundancy. It will work with one plugged in but you are “supposed” to plug in both.

    It’s fundamentally not that different from a consumer desktop. Plug in a monitor and a keyboard and a USB with your preferred flavor of headless Linux installer on it. Configure ssh as the first thing you do because you won’t want to plug the monitor and keyboard into it every time you need to tweak something.

    You can probably find VGA to HDMI adapters if you can’t find a monitor with VGA support.