Hacker Newsnew | past | comments | ask | show | jobs | submit | trelane's commentslogin

https://x.com/PalmerLuckey/status/2027500334999081294

It is an interesting point. What's the difference between this use license and others?


If the government thinks the terms of Anthropic are unacceptable, they can just stop using them, right? But why would you then retaliate and ban other companies from making business with Anthropic if they want to be a defense contractor? How do these requirements make Anthropic a supply chain risk that makes them unusable for use by other companies?

> If the government thinks the terms of Anthropic are unacceptable, they can just stop using them, right

That is what they are doing.

> why would you then [....] ban other companies from making business with Anthropic if they want to be a defense contractor

Because, if it shops with Anthropic code, the DoD becomes subject to the restrictions when they receive the contractor's product. Anthropic's limitation is on the use, not (just) on the product or distribution.

To stop using them requires making the suppliers still using them as well.


> Because, if it shops with Anthropic code, the DoD becomes subject to the restrictions when they receive the contractor's product. Anthropic's limitation is on the use, not (just) on the product or distribution.

How does that work? If the contractor uses Anthropic to make some slides and write a report, the DoD can’t use the contractors stuff however they want?


That's just wrong. At most it requires the DoD to require that contractors do not use it on the work for the DoD.

It's perfectly reasonable for the US government to end the contract if they no longer like the terms they agreed to (assuming the contract does in fact let them); it's not reasonable to destroy the counterparty to the contract in retaliation. The line "I am altering the deal; pray I don't alter it further" is literally spoken by Darth Vader, the most comic-book of comic-book villains.

Then the government should end their contract with Anthropic. The terms of the contract were clear.

Designating them a supply chain risk is unprecedented authoritarian strong-arming.


This is nice rhetoric but ignores the fact that the elected officials are bought out by other billionaires. The US is an oligarchy in a republics clothing.

Also that they are unlikely to get a fair shake unless they say what folks here want to hear.

Well, what we don't want to hear is "I'm just doing my job"

HN in a nutshell


One advantage of AI-generated copy is it generally doesn't make mistakes like this.

The only mistake I've noticed, besides inexplicably lapsing into Chinese mid-sentence, is parallel construction errors, like "This product is fast, lightweight, and won't break the bank!"


> parallel construction errors, like "This product is fast, lightweight, and won't break the bank!"

I'm failing to see the error. That seems like perfectly sound, vernacular English.


The first two of the three are adjectives, each connected to the subject by the one "is," and the third is a verb phrase not using the "is." Ideally they'd be all adjectives using the "is," or all phrases supplying their own verbs.

Not the worst error in the world, but it stands out in LLM text that is otherwise remarkably nit-free.


But is it even an error? You are parsing it as a single list, but it could just as well be parsed as "subj ((is {a,b}) and vp-predicate)".

I guess you could argue that the first list needs an "and"? That's fair I suppose.


(We have descended into one of the deeper circles of grammar hell. I will remind you that you're free to leave at any time.)

Yes, exactly. English grammar actually doesn't require the "and" to end a list (leaving it out is called "asyndeton" if you're curious). A good example is Lincoln's Gettysburg Address: "... and that government of the people, by the people, for the people, shall not perish from the earth."

So after all this, there actually is a way to analyze the example that is strictly valid. But most people would look askance at the standalone sentence "This product is fast, lightweight." That is, I suppose, unless someone like Abraham Lincoln worked it into his next speech.


Well, if we're going by what "most people would accept" we should probably allow:

* This product is fast/lightweight.

* This product is fast. Lightweight.

But yeah, this way lies madness. Unless we passed somewhere it in the dark back there.



Man In The Middle. They're saying that the US is intercepting the traffic.

What do you think cloudflare is? This is just them coming out with it now.

Also MITM? The comment you are replying to in no way implies that this is the only MITM.

Since they masquerade as example.com with an https certificate that your browser will trust: yes.

It is much more convenient to catch the fish that eats particular sort of worms putting such worm on a hook than finding the right fish among many others in a fishnet.

I am not claiming the OP ist right or wrong.

I am merely explaining what MITM is and what the OP meant.


Cheating on tax credits also comes to mind


Do you mean now, or then?

Bad is still bad, no matter what the party doing it.


> What prevents Microsoft from mandating removal of enrollment permissions for user keychains and Secure Boot toggle, hence every Linux distribution has to go through Microsoft's blessing to be bootable?

Why are you buying hardware that Microsoft controls if you're concerned about this?


With TPM, Microsoft controls practically all the Intel hardware.


Not all. The ones that ship Linux preinstalled and with support don't.


I hope you are mistaken. It's embarrassing how far behind in security the desktop Linux ecosystem is.


Agreed in general. But regarding secure boot, it's not like shim actually helps with real security either afaiu, right?


AFAIU (I haven't looked much into it) shim basically exists so that MS signs the shim once (or only a few times when updated), which has the distro public key embedded, which does further verification of the chain (bootloader/kernel) which gets updated more frequently.


That's basically my understanding too. But since you can still boot any shim-supported distro, Secure Boot + shim practically gains you nothing. An adversary can simply boot their own own copy of shim with whatever OS they like.


> An adversary can simply boot their own own copy of shim with whatever OS they like.

They'd need to get MS to sign it first, but otherwise yea. That's why I remove the MS keys on my non-windows systems.


I don't know all the ins and outs, but because of the Machine Owner Key (MOK) mechanism in shim, it should be possible to boot arbitrary OSes without MS signing anything.

Your step of removing the MS keys works of course :) Although I've heard that can be risky on various systems that need to load MS-signed EEPROMS. Also I think that firmware updates can be problematic?


> Although I've heard that can be risky on various systems that need to load MS-signed EEPROMS

Yea, I bricked a Gigabyte board and still haven't been able to fix it. I just replaced it with an Asrock board and that has settings for what to do with option-rom when secureboot is enabled (always execute, always deny, allow execute, defer execute, deny execute and query user) and I have no clue what half of them specifically do (like, does "allow execute" only execute if a matching key exists and doesn't execute if it doesn't? and what is the difference between "always deny" and "deny execute"? and defer to when??). But I just set it to always execute and my problem is solved.


I believe you are confusing security with freedom and "behind" with "advanced".


They have a TPM that you can enable and add your own keys if you want to.


For now.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: