• 0 Posts
  • 157 Comments
Joined 3 years ago
cake
Cake day: June 10th, 2023

help-circle


  • A lot of ai hallucinations can be resolved by simply running the results through additional prompts automatically, then checking the various results against each other or against reference material.

    Many agentic systems already do that with a limited number of follow up/check steps, but they’re often restricted by acceptable response times or just sheer costs.

    I managed to get copilot in excel to run a 43 prompt chain in just a little under 10 minutes the other day. The result was exactly what I needed.

    If you have 73 times the output, you can potentially afford to do that kind of processing in an acceptable time frame and cost level.











  • BlameThePeacock@lemmy.catoProgramming@programming.devLLMS Are Not Fun
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    10
    ·
    3 months ago

    Improving your input, and the system message can also be part of that. There are multiple optimizations available for these systems that people aren’t really good at yet.

    It’s like watching Grandma google “Hi, I’d like a new shirt” back in the day and then having her complain that she’s getting absolutely terrible search results.








  • It really just helps in cases where you get hacked, but the hacker doesn’t have continued access. Say someone physically penetrates into your building, grabs the key through an unlocked station, and leaves.

    That being said, like you mentioned, if someone is going through this effort, 45 days vs 90 days likely won’t matter. They’ll probably have the data they need after a week anyways.

    Encryption key theft really requires a secondary attack afterwards to get the encrypted data by getting into the middle and either decrypting or redirecting traffic. It’s very much a state level/high-corporate attack, not some random group trying to make a few bucks.