I can put it all in, say, 24 bits, if my database is small. 140k games, 120 positions each. log(140000*120)/log(2) ~~ 24.001, and surely there will be some duplication.
The encoding is just the index number of the game + move that resulted in that position.
The really fast part is the challenge though. If we assume that in pre-LLM world, there was enough resource for mid/senior level engineers to review junior engineer code and then in LLM world, lets say we can produce 10x the code, unless we 10x the number of mid/senior level engineering resource dedicated to review, what was once possible is no longer possible...
I do feel like I can review 2-3x with a quicker context switching loop. Picking back up and following what the junior engineer did a a couple of weeks after we discussed the scope of work is hard.
> A state actor would (and could trivially) pad the wrong directions
This isn't how BGP works. An AS-PATH isn't the path the traffic will follow; it's the path that this overall announcement has allegedly tranversed and is (one of many attributes) used to judge the quality of route. The next hop tells our peer where they should send the data if they like this route.
Putting more things in the AS path makes the route less attractive. Leaking a new route isn't going to magically make some other route become more preferred.
Lower cost usually means lower quality and is an example of how a long path being leaked can result in traffic flowing away from high quality path to the leaked path.
Not saying that this is the case with Venezuela, just explaining the reality of BGP where path prepends are often ignored.
> > > That's presumptuous: A state actor would (and could trivially) pad the wrong directions to flow traffic down to pops that are not making new announcements
> > Leaking a new route isn't going to magically make some other route become more preferred.
> Not magic, but technology can look like magic when you don't understand it.
Please let me know of the scenario where route A is preferred, undesirable, long-path route B is advertised/leaked, and as a result traffic flows over route C.
I've used BGP for over 25 years, so I'm really curious what you're thinking. Or if you're describing something else, you're being really unclear.
Or if you're just describing withdrawing a route and replacing it with a really undesirable route -- sure, we do that all the time. But that doesn't match this scenario and isn't going to get flagged as a routing anomaly.
You know what's really toxic? Not explaining what you mean and just sending some introductory lab documentation about what the other person has already clearly shown they understand.
I don't even know what you mean by a lot of these things.. e.g.
> > > As soon as I peer with two big sites that don't peer directly with each-other, they both gotta let me forward announcements unfiltered across them.
A straightforward reading of "forward" doesn't work for this sentence. I should not take a route from peer A and send it to peer B. Peering isn't transitive. If I try, it should be filtered.
Peering means to give your own routes (and your transit customers' routes) to someone else. Not your other peers routes.
> Please let me know of the scenario where route A is preferred, undesirable, long-path route B is advertised/leaked, and as a result traffic flows over route C.
> ... I'm really curious what you're thinking
That the actor actually wanted the traffic to flow over route C.
> You know what's really toxic? Not explaining what you mean and just sending some introductory lab documentation about what the other person has already clearly shown they understand.
I think perhaps you and I have different ideas of what is "clear", for example when you said something that is totally covered in introductory lab documentation, I thought it was clear that you did not understand.
> I don't even know what you mean by a lot of these things
That is clear! But confusing! How can you clearly understand but not know what I mean?
> Peering means to give your own routes (and your transit customers' routes) to someone else.
That's exactly what's happening here: Not every transit customer peers with every other transit customer.
> > Please let me know of the scenario where route A is preferred, undesirable, long-path route B is advertised/leaked, and as a result traffic flows over route C.
Yes, but how does advertising undesirable route B make traffic go over route C? This is why I think you're confused.
> That's exactly what's happening here: Not every transit customer peers with every other transit customer.
I am not understanding what you're saying at all. You said:
> > > > As soon as I peer with two big sites that don't peer directly with each-other, they both gotta let me forward announcements unfiltered across them.
This is the thing you are supposed to never do as a peer, and the thing that I have a whole bunch of filtering to prevent my peers from inadvertently doing.
Are you misusing the word "peer"? It's hard to talk about BGP and routing policy without using these words correctly.
> I am not understanding what you're saying at all.
And that is why; You seem to have a very strong opinion about something that you don't understand "at all" and frankly I cannot understand how that can work.
> This is the thing you are supposed to never do as a peer
So you say, but that's what I did when back in the early 2000s, and that's what the parties in the news were doing, and if you're not totally lying to me, you know this because it's the default in BGP, that's why you would say you need to:
> I have a whole bunch of filtering to prevent my peers from inadvertently doing.
because that's how BGP works. Duh.
> It's hard to talk about BGP without using these words correctly.
and I am flabbergasted you continue to persist at it, when I have even offered you "introductory lab documentation" to help.
Peering means "give our downstream customers' routes plus our own routes; receive the same from them".
Transit means "give our entire table, receive their routes plus their downstream customers routes".
You don't give one peer's routes to another. You filter to make sure you are not doing this. They hopefully filter (using data from RIRs) to make sure you're not doing it. If both parties screw up the filtering, you "leak routes" like we're discussing here.
This has been standard practice for peering since at least 1997. It is codified, among other places, in RFC7454.
> And that is why; You seem to have a very strong opinion about something that you don't understand "at all" and frankly I cannot understand how that can work.
Do you operate an AS? Are you a peering contact? I mean, I only do it mostly for funsies now but for quite awhile that was part of my job. :P
Also, still seeking an answer to this question:
> > > Yes, but how does advertising undesirable route B make traffic go over route C [that previously went over route A]? This is why I think you're confused.
I set up multihoming in the US (going through ARIN assignment for ASN and PI) in the early 2000s and for another larger company in the UK (doing the same same but different) in the early 2010s.
> Also, still seeking an answer to this question:
Not sure what to tell you. I've answered this within the context of the news article, if you're asking specifically what kinds of configurations do that they're the kinds that are in that "introductory lab documentation" and if you're not overstating your credentials you should be able to understand.
OK, so you've never actually been involved in peering between providers. That explains things.
If you are buying transit for multihomed site, you just mostly need to worry about advertising your few local routes and receiving a table.
These words mean specific things in a provider environment. Peering between providers is not transitive. You should not give a peer's routes to another peer-- else you are offering to provide transit to that peer.
None of the three parties involved (the peer the route came from, the peer the route would go to, or you), generally, want this.
> As soon as I peer with two big sites that don't peer directly with each-other, they both gotta let me forward announcements unfiltered across them.
So -- this is true for neither scenario. If you buy transit from two people, you don't want to "forward" routes between them. Likewise for two peers. You only want to pass on your own routes, plus routes for your downstream customers or to your downstream customers.
The other topic that caused confusion: leaking a route to somewhere won't change where traffic goes unless that new leaked route wins. If it wins, the traffic will come to you (regardless of AS path). If it doesn't win, the existing route will still be used.
I'm retired-ish now, too (now I'm mostly a high school teacher for the funsies). But if you find yourself with BGP infrastructure in HE.NET Fremont, or somewhere that can peer with FREMIX, or somewhere that can access KCIX, feel free to send me a peering request. I currently have 2 direct upstream transit providers and 55 peers across 3 sites and export 6 prefixes plus 2 downstream prefixes :P
The problem is that Google isn't hosting the content. They're merely linking to it. There's no content to "take down."
I don't think there's standing to sue. Linking to pirated content isn't illegal. They could be found guilty of contributory infringement but that's a tough case since the legal requirement is that Google needs to know for sure that it's pirated (which is impossible at scale).
The author only needs to show up to court with a driver’s license to prove their identity. The judge would rule in favor of the author the same day if someone from Google actually bothered to show up.
A scammer isn’t going to court. Don’t try to solve for that.
I love how this is the defense of all these tech companies. "I'm sorry, your honor, we are just a poor multi-trillion dollar company... there's just no way for us to control anything, because we're just too big..."
Either they solve it or they should give op the benefit of the doubt. Arguing that x or y isn't possible at scale doesn't mean you get to break the law.
No they shouldn’t give anybody the benefit of the doubt when that person claims copyright infringement! Not unless you want internet randos to be able to take down any YouTube channel they want for “copyright infringement.”
As far as I can tell, requiring valid ID would lose a provider safe harbor protection as it is not one of the required elements:
(3) Elements of notification.-
(A) To be effective under this subsection, a notification of claimed infringement must be a written communication provided to the designated agent of a service provider that includes substantially the following:
(i) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
(ii) Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.
(iii) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.
(iv) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.
(v) A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.
(vi) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
I'll be the first to shout from the rooftops that the DMCA is in general a bad law, but according to that law, if the takedown notice contains the required verbiage, then they are required by law to give it the benefit of the doubt (that is, if they want to keep their lack of liability).
> Not unless you want internet randos to be able to take down any YouTube channel they want for “copyright infringement.”
Until there's a database of all the copyrighted works in the world that anyone can access—along with their licenses—it is absolutely not possible to know for certain if something is violating copyright.
Simple example: Disney opens up a new website that has some of their obvious content on it. How does Google know that Disney owns that website and has authorized its use? If they get a takedown notice, how do they know the sender owns the content?
There's no formal verification system that exists for such things. It's all based on an honor system that is easy for bad actors to abuse (which is probably why Google changed how they do things).
The entirety of copyrighted law has failed. It isn't working as intended and hasn't for a long time now. Anyone who understands how easy it is to copy bits should know that the original intent of copyright can't work anymore. We need something new to replace it.
> Anyone who understands how easy it is to copy bits should know that the original intent of copyright can't work anymore.
AI makes this even more stringent. You cannot protect the "vibe" of your works, AI can replicate it in seconds. If you make "vibe infringement" the new rule, then creativity becomes legally risky. A catch 22.
In 1930 judge Hand said in relation to Nichols v. Universal Pictures:
> Upon any work...a great number of patterns of increasing generality will fit equally well. At the one end is the most concrete possible expression...at the other, a title...Nobody has ever been able to fix that boundary, and nobody ever can...As respects play, plagiarism may be found in the 'sequence of events'...this trivial points of expression come to be included.
And since then a litany of judges and tests expanded the notion of infringement towards vibes and away from expression:
- Hand's Abstractions / The "Patterns" Test (Nichols v. Universal Pictures)
- Total Concept and Feel (Roth Greeting Cards v. United Card Co.)
- The Krofft Test / Extrinsic and Intrinsic Analysis
- Sequence, Structure, and Organization (Whelan Associates v. Jaslow Dental Laboratory)
- Abstraction-Filtration-Comparison (AFC) Test (Computer Associates v. Altai)
The trend has been to make infringement more and more abstract over time, but this makes testing it an impossible burden. How do you ensure you are not infringing any protected abstraction on any level in any prior work? Due diligence has become too difficult now.
OP got in touch with one (or many) humans on Google. Humans then decided not to act on the DCMA request.
No need for the "doesn't scale" argument, whatever system they have in place is already good enough to process OP's inquire. The problematic bit is what they decided to do once they had all the information in their hands.
I do, however, think this is just a mishandled situation and Google will correct, particularly after being featured on the HN wall of shame.
Before we can assume this is impossible for Google, let's look at their revenue: Is it greater than the salary of 1 person, which is all that's required to comply with OP's request? If so, then it isn't impossible.
To judge the claim of unscalability true, we would first need to know the rate of DMCA takedown requests, the number 1 person can investigate in a day, and then we can do the math of whether total revenue can pay for those employees.
Even if not, it's not an excuse. The only legal venue google has to complain about this, is getting the law changed.
It’s certainly due for an update, but it isn’t doing nothing at all. The friction it creates for unlicensed use at scale is enough to keep all the streaming services etc. afloat, which in turn are still funding the production of content. Maybe the anarchy that would follow its abolition would be superior to the old system creaking along, but that remains to be seen (and would be silly to accept on faith).
I don't know, how did the world manage to work before the internet?
You call someone, you send a letter, something. It's not rocket science.
It's not automated, sure, but somethings will never be automated, just by their nature. That doesn't mean it doesn't scale. Well, sure it does. You just hire more staff.
For Christ's sake, it used to be that phone calls required physical action from an operator to get connected. And now we can't do shit if there isn't an API for it or some bullshit.
> It's not automated, sure, but somethings will never be automated, just by their nature. That doesn't mean it doesn't scale. Well, sure it does. You just hire more staff.
You're right, of course, but when people say "it doesn't scale" they tend to mean "it doesn't scale at with a near-zero marginal cost".
Right, it scales linearly, as is the case in most businesses. Only tech craves a constant time scaling factor, because in most business it's just not possible. You can't run 100 walmarts with the same employees as 1 Walmart, and Walmart knows that and is very successful in spite of it.
I've got mixed feelings about the DMCA, but its one redeeming value is that it's available to everyone. Deciding to make it readily accessible to large publishing interests but giving a random author the side-eye is not so great.
> but its one redeeming value is that it's available to everyone
Well - the legal system favours those with more money, so basically it is corporate-law that is in effect there. And Google has enough money to burn and protect against small authors.
I think expended effort is what counts here for these types of interactions, and how much of that effort is tailored to the specific person.
I mean, we're almost always standing on the shoulders of other people, and we're almost always using tools. But if the output is fully mechanical and automatic without being tailored for the specific person, it's hard to see it as personal in any way.
> treats alcoholism more like a sin rather than a health problem
This is contrary to my understanding of 12 step. Silkworth's framing (which heavily influenced AA) was that alcoholism was the result of an individual's physical reaction to alcohol, not a moral failing.
> rooted in Christian theology
They were absolutely influenced early on by the Oxford Group, too, which did provide some of the context and language.
No. 12 steps is very self-centred and while they don't say it's forbidden to join a union or prisoner's association, start a book club, work at a mutual aid centre or whatever and tell everyone 'hey I'm partially here because I need new friends and help to keep sober', it's also not something embedded in these types of programs.
Commonly the 'mentoring' in 12 steps is also based on you contacting your mentor, rather than building a network of people that check up on you whether you realise it's a good idea or not. This varies between groups, however, it's not as consistent as some of the other individualist traits they tend to have.
Edit: Personally I suspect this partially explains why 12 steps has a pretty bad success rate.
They are being sarcastic but their point is taken, it's a punishment based system on the individual for their moral failings rather than a collective solution based system.
The times I have just sat and listened to a well-told, well-paced story have been magical.
But the dopamine hit of reading -too quickly- competes; the pressure to "be busy" wins and makes me impatient for the spoken word by default.
The defaults are too high. I'd be better off reading less but reading more slowly, and listening sometimes.
But this is not the highest priority problem to fix, either, and I can't fix everything.
reply