Lex Toumbourou

0 Followers
38 Following
30 Posts
CTO of Splash. From Brisbane, Australia (prev Melbourne). #Software, #ML, #GameDev, #Python, #Zettlekasten
Websitehttps://notesbylex.com/
LinkedInhttps://www.linkedin.com/in/lextoumbourou/

I tried singing voice conversion on my vocals this weekend, and the results were amazing.

I created a solid model with less than 20 minutes of voice data that sounded like I could sing with perfect pitch across multiple languages.

Results: https://www.youtube.com/watch?v=KES3UPP6pqg&list=PLYwKkLiwYbByrr1Mj4wpfMVrnTH9XeylO&index=1

Write-up: https://notesbylex.com/making-song-covers-with-my-ai-voice.html

#music #ai #aimusic

Lex AI - Dreams (Fleetwood Mac AI Cover)

YouTube

Amazon Begs Employees Not to Leak Corporate Secrets to ChatGPT

This issue seems to have come to a head recently because Amazon staffers and other tech workers throughout the industry have begun using ChatGPT as a "coding assistant" of sorts to help them write or improve strings of code, the report notes.

https://futurism.com/the-byte/amazon-begs-employees-chatgpt

Amazon Begs Employees Not to Leak Corporate Secrets to ChatGPT

After catching snippets of ChatGPT text that looked a lot like company secrets, Amazon is now trying to head its employees off from leaking to the AI.

Futurism

Hi, I am collecting cuda install issues/bad experience with the hope of improving future experience.

Please DM me or respond here.

#cuda #deeplearning #machinelearning

It is incredible how quickly I lost interest in seeing generative art. For the first week, I couldn't get enough of it. Now, I couldn't be more bored with it: if I see it in my feed, it's an instant scroll.

Surprisingly, I'm still as interested as ever in works of art by people.

#aiart

If you're tired of reading about a certain CEO of a certain social-media website, here's a terrific look at another CEO—who has turned around, of all things, Barnes & Noble. His super power? "He loves books," writes Ted Gioia.
https://tedgioia.substack.com/p/what-can-we-learn-from-barnes-and
What Can We Learn from Barnes & Noble's Surprising Turnaround?

Digital platforms are struggling, meanwhile a 136-year-old book retailer is growing again. But why?

The Honest Broker
Website that tests your ability to identify #AI art. Got 20 correct after 25 attempts…80% not to bad for first try
http://aiorart.com/
** AI or Art? **

Guess if an image was made by an AI or an old famous painter.

Prediction 2023: Self improving AI systems with synthetic data. We ain't seen nothing yet. #ai
---
RT @mathemagic1an
The 'data engine' idea of defensibility in AI may not be as defensible as we thought:

In SELF-INSTRUCT, authors get GPT-3 to generate it's *own* dataset for instruction tuning, outperforming vanilla GPT-3 and comparable to InstructGPT.

https://arxiv.org/pdf/2212.10560.pdf

Here's how 👇
https://twitter.com/mathemagic1an/status/1607384423942742019

He talked about electric cars. I don't know anything about cars, so when people said he was a genius I figured he must be a genius.

Then he talked about rockets. I don't know anything about rockets, so when people said he was a genius I figured he must be a genius.

Now he talks about software. I happen to know a lot about software & Elon Musk is saying the stupidest shit I've ever heard anyone say, so when people say he's a genius I figure I should stay the hell away from his cars and rockets.

So far, I've been impressed with my Gen-Z colleagues. They are hardworking, ambitious, resilient and mature. And unlike my generation, they have plenty of ideas about how to have fun that don't all revolve around alcohol.

#gen-z

Many of you have been asking for my thoughts on the #LastPass breach, and I apologize that I'm a couple days late delivering.

Apart from all of the other commentary out there, here's what you need to know from a #password cracker's perspective!

Your vault is encrypted with #AES256 using a key that is derived from your master password, which is hashed using a minimum of 100,100 rounds of PBKDF2-HMAC-SHA256 (can be configured to use more rounds, but most people don't). #PBKDF2 is the minimum acceptable standard in key derivation functions (KDFs); it is compute-hard only and fits entirely within registers, so it is highly amenable to acceleration. However, it is the only #KDF that is FIPS/NIST approved, so it's the best (or only) KDF available to many applications. So while there are LOTS of things wrong with LastPass, key derivation isn't necessarily one of them.

Using #Hashcat with the top-of-the-line RTX 4090, you can crack PBKDF2-HMAC-SHA256 with 100,100 rounds at about 88 KH/s. At this speed an attacker could test ~7.6 billion passwords per day, which may sound like a lot, but it really isn't. By comparison, the same GPU can test Windows NT hashes at a rate of 288.5 GH/s, or ~25 quadrillion passwords per day. So while LastPass's hashing is nearly two orders of magnitude faster than the < 10 KH/s that I recommend, it's still more than 3 million times slower than cracking Windows/Active Directory passwords. In practice, it would take you about 3.25 hours to run through rockyou.txt + best64.rule, and a little under two months to exhaust rockyou.txt + rockyou-30000.rule.

Keep in mind these are the speeds for cracking a single vault; for an attacker to achieve this speed, they would have to single out your vault and dedicate their resources to cracking only your vault. If they're trying 1,000 vaults simultaneously, the speed would drop to just 88 H/s. With 1 million vaults, the speed drops to an abysmal 0.088 H/s, or 11.4 seconds to test just one password. Practically speaking, what this means is the attackers will target four groups of users:

1. users for which they have previously-compromised passwords (password reuse, credential stuffing)
2. users with laughably weak master passwords (think top20k)
3. users they can phish
4. high value targets (celebs, .gov, .mil, fortune 100)

If you are not in this list / you don't get phished, then it is highly unlikely your vault will be targeted. And due to the fairly expensive KDF, even passwords of moderate complexity should be safe.

I've seen several people recommend changing your master password as a mitigation for this breach. While changing your master password will help mitigate future breaches should you continue to use LastPass (you shouldn't), it does literally nothing to mitigate this current breach. The attacker has your vault, which was encrypted using a key derived from your master password. That's done, that's in the past. Changing your password will re-encrypt your vault with the new password, but of course it won't re-encrypt the copy of the vault the attacker has with your new password. That would be impossible unless you somehow had access to the attacker's copy of the vault, which if you do, please let me know?

A proper mitigation would be to migrate to #Bitwarden or #1Password, change the passwords for each of your accounts as you migrate over, and also review the MFA status of each of your accounts as well. The perfect way to spend your holiday vacation! Start the new year fresh with proper password hygiene.

For more password insights like this, give me a follow!