Jake [he/him]

  • 0 Posts
  • 4 Comments
Joined 7 months ago
cake
Cake day: April 3rd, 2024

help-circle
  • The offline AI that I tried a few months ago probably needed training on the noise environment to get decent results. I forget which ones I tried but likely the ones with extensions already in Oobabooga Textgen. I was messing with text to speech mostly, but some of the ones that do TTS also have packages and examples for STT. Nothing I tried for offline generation was good enough to speak as an AI prompt without manual corrections.





  • Jake [he/him]@lemmy.mltoLinux@lemmy.mlWindows just fucked up my bootloader...
    link
    fedilink
    English
    arrow-up
    104
    arrow-down
    2
    ·
    7 months ago

    You likely have secure boot and a Microsoft package key installed in UEFI. They likely did what they are supposed to do and removed the unsigned software.

    You must either sign your own UEFI keys using the options in your bootloader that may or may not be present, or you must use a distro that has the m$ signed secure boot shim key. These are the only ways for both m$ and Linux to coexist. Indeed, with a shim key (Fedora/Ubuntu) you can easily have a windows partition on the same drive without issues.

    Secure boot is a scheme to steal hardware ownership. Of course they say it is not because the standard specifies a mechanism to sign your own keys. However the standard specification is only a guideline and most consumer grade implementations do not allow custom key generation and signing.

    If you need to do your own keys, search for the US defense department’s guide on the subject. It is by far the most comprehensive explanation of the system and how to set it up correctly. They have a big motivation to prevent corporate data stalking type nonsense and make this kind of documentation accessible publicly.

    If your bootloader does not allow custom keys, there is a little known tool called Keytool that allows you to boot directly into UEFI and supposedly change the keys regardless of the implemented utility in the bootloader. I have never tried this myself. The only documentation I have found was from Gentoo, but their documentation assumes a very high level of competence.