this post was submitted on 08 Sep 2025
586 points (96.8% liked)

memes

17336 readers
2168 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/Ads/AI SlopNo advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] Septimaeus@infosec.pub 18 points 1 week ago

They can’t unless your entire system is compromised.

That research paper was a POC using kernel access and the models used were calibrated to specific subjects in a particular setting. Replicating it for anyone anywhere would require much, much more sophisticated models and that the target has given you root.