I've already had the misfortune to see that. I'm not sure whether the person concerned actually thought that posting something from ChatGPT would convince us. I'm sure that the next time, he'll not tell us at the start that it was generated by a bot, because everyone else was quick to inform him that, no matter what you get a program to print out, it doesn't make illegal things legal and it won't convince us to do any of those illegal things for him (in this case, copyright infringement by violating a software license). From his responses, I don't think he understood our misgivings.
Posts by doublelayer
10880 publicly visible posts • joined 22 Feb 2018
Page:
- ← Prev
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- Next →
4chan and other web sewers scraped up into Google's mega-library for training ML
Re: Devil’s advocate
"What if they are true?"
Then they probably aren't that close to the middle of the contentious area. There are some statements of fact that are contentious to some people who insist on denying the facts, but even in those cases, the most contentious statements tend to exaggerate or create moral statements based around those facts. Most other stuff that's very contentious is a matter of opinion. Stating an opinion as if it is undeniable fact isn't a great operation for a chatbot intended to provide useful information. Nor would mangling a fact in order to back up a contentious opinion. I'm sure some people are busy writing chatbots to back up their opinions, but the models that have been released so far are intended to provide information, not to easily spit out an unending series of propaganda.
Re: "Problematic, racist, and pornographic web content"
It's a generic term for anything they don't want the AI to show to someone else. If I wrote a joke page of arithmetic questions with wrong answers, they probably consider that problematic because their AI doesn't know how to calculate itself, so it could memorize my wrong answers and give them to someone else. If I posted a large website of the output from Markov chains, that would likely be problematic because it could get their AI to make nonsense phrases of English words and they want it to make sense.
Of course, there are other kinds of problematic that are more about the subject matter which they disagree with. If there was a website advocating crime, they likely don't want their bot to start suggesting that people start burning things down, so that would be problematic. That arson-focused site wouldn't have to be racist to be unsuitable for their training data.
Microsoft nopes out after Twitter starts charging $$$ for API access
Re: Let me see now...
"Company A puts it's prices up and company B ceases to buy from them. Company A then threatens to sue. Have I got that right?"
Not quite. You missed a step.
Company A puts it's prices up and company B ceases to buy from them. Company A would, if run by a competent person, consider whether the price decision was a good idea or not and might change things. Company A is not run by a competent person, so their response is to try to find some other cause to sue. They don't have one, so Musk had to make one up, which is now something about training AI on Twitter data, whether or not that actually happened. This is probably also not a basis for a lawsuit since Twitter's terms of service give them the right to host the content, not all the copyright rights to that content, so they may not be allowed to sue for copyright violation unless it's Twitter-generated content.
Interestingly enough, if Twitter data was used to train an AI, it's most likely GPT. That's not owned by Microsoft even though they have a lucrative partnership, so Musk would have to sue OpenAI, which he originally funded. Maybe they'll find some other cause for a lawsuit that will make more sense, but I doubt it.
Guy rejects top photo prize after revealing snap was actually made using AI
Re: Thumbnails...
"I just can't believe that any judges who would have looked at the image for more than a few seconds would be convinced that it was a real photo?"
From the article, they made it clear that AI was allowed, as was basically anything you wanted to use, so there was no requirement for it to be a real photo. The judges could easily have known it wasn't an original photo and accepted it anyway.
"(c'mon, the money and equipment is small change for Sony, it is indistinguishable from "nothing" compared to the regular advertising budget)...."
If the article is accurate, they repeatedly offered to give him the money and equipment and he repeatedly refused the prize. It's logical to find their response annoying, but it's weird to blame them for withholding a prize he was pretty clear he wouldn't accept.
Re: C2PA
A blog entry from someone who runs an online photo analysis system might interest you. This is one of a few entries on related topics, but it includes more commentary on C2PA. The short version is that, though he wasn't able to get technical details because the closed standards group wouldn't allow him to post any views, the general concept is weak and prone to problems. He has found many examples of a related algorithm being used with incorrect metadata, but signed anyway.
Re: C2PA
This would work great for a contest that was for raw photos only, set up the shot, point the camera, and that's it. This contest is not that, nor are most others. Modifications of the photos later, as basic as cropping out unwanted parts but including more complex things, are typically allowed. Only if you use a system that always includes a chain of the previous images could you verify the authenticity of a picture in that way. That's not that likely to happen, and if the only benefit of doing it ends up being to avoid use of AI in AI-not-accepted contest rules, I don't think it's worth doing.
Chromebook expiration date, repair issues 'bad for people and planet'
Re: Bit one sided
I mean for things like new versions of Windows. I can take a Windows 10 32-bit installation disk and install it on a 2000 Pentium. The installer won't prevent me, but it's not going to run very well. Their system requirements page will suggest that it's not going to work, but it actually does if you're willing to have weird and annoying latency with the mouse and keyboard. Windows 11 has changed this a bit because it now checks the requirements, but if you bypass that check, it still works as before. People have proven that by showing that Windows 11 installs and runs on hardware that completely fails the stated requirements. That doesn't get Microsoft off the hook for Windows, and they have some other bad examples (Windows Phone, for example), but anyone trying to claim that Chrome OS is better than Windows on this stuff either completely misunderstands the details or is biased.
Windows's hardware requirements were for technical reasons, and if you tried to ignore them, you could but you'd see the technical reasons. Google's expiration is not for technical reasons, and if you try to ignore them, you can't because they check where Windows did not. The only bypass solutions that might work are invasive, possibly unsupported, and very device-specific.
Re: This con is as old as the hills, but could easily be fixed.
"It is disappointing that there are so many able coders on the planet, but none seem to care enough about this to produce a BTL."
That's because we have. Open source operating systems that support lots of hardware, on which you can run the latest version of a browser. What's the advantage in making a version that will run on Windows 98 when, if you still have a computer that runs Windows 98, you could try to run a different operating system on it. Linux probably still supports the processor in that, and if it doesn't a slightly older version of the kernel before 486 was dropped will. You'll run into problems, but because you probably have very little RAM and a hard drive that's hanging on by a thread, but it can run if you put some work into it. The alternative is either to use another system, which is inefficient, or to write custom code for every environment that has ever existed to fit within constraints that no longer apply to most users.
As for any computer that needs hardware to use modern software, like trying to use the ZX81, that's just wasteful. If I'm putting a much more powerful computer in between the old computer and the internet, maybe it's better if the user just uses that more powerful computer. Unless I'm doing it just for fun, and some people have (I think there was an article about someone connecting a C64 to WiFi recently using a Raspberry Pi), then what's the point? In that case, you could just plug the Pi into your screen and use that instead.
Re: Bit one sided
Maybe you noticed that I mentioned that several times in my comment? That it would be cut off from support in 2025, thus limiting the Windows life for that unit to 13 years? Maybe the fact that I complained about Microsoft not having a good reason for cutting it off?
The fact remains that, even for machines from 2016, that's longer than even the extended support for select Chromebook models that Google are providing. The other fact remains that, if I was motivated enough, I can make that laptop install Windows 11, because the hardware checks can be bypassed and the software will run. I don't think Microsoft should get any credit for that, which is why I'm perfectly content to yell at them for the 13-year cutoff, but try unlocking the support death dates on a Chromebook as easily as running a program on the Windows installation media which works for every model.
Re: Bit one sided
"Why can't I do something similar for things marketed by Micro$oft or Google."
That depends what your problems with those companies are. You can do that with several kinds of computer designed to run Windows. The machine I used as an example wasn't the oldest machine that could do it. It was just the one I installed Windows on a week ago. I could replace the storage and RAM, and the battery since this was a laptop. Switching out the processor wouldn't have been very easy though.
If you mean the Surface line from Microsoft, you can for a few of them, but many of them you can't because the hardware was designed to be thin with no thought put into repairability so a lot of them are quite difficult to take apart without breaking something.
As for Google, you can't because Google doesn't want you to. Even if the hardware allows you to replace components, you can only do that to repair the non-upgradable system, not to keep it running the latest software. That was my original complaint.
Re: Bit one sided
"Those who came before and exist today I.e Microsoft have done a great job at building in a 3 obsolescence cycle into hardware and software ,Google should be aaplauded or committing to 8 years as a starting point."
I can't tell if your 3 means three years or you made a typo somewhere. If you actually think there's anything like a three-year obsolescence cycle, I have no clue what you're talking about. Microsoft hasn't tended to cut off support historically, but they have demonstrated they're willing to now. However, that's not anywhere close to three years. I have recently installed Windows 10 on a computer with a Sandy Bridge (2012-era) processor. It runs and rather quickly. It gets updates. It will continue to get them until 2025. That's 13 years. That's not the oldest machine that can do that.
Google's promise is worse than you say for two reasons. First, it's not always eight years. It was originally 6.5 years, and they've extended it to only some models. That's 6.5 years from the original release date, not from the cancellation date. If a manufacturer is still selling devices they made in 2020, they get three years even though you're buying a newly-made device. More importantly, there is no technical reason for the expiration. When Windows cut off devices in the past, they didn't really cut them off; the device just wouldn't run well. That's the part that they've changed, and for reasons I don't believe, but their excuse is still technical requirements that they're building into their code. Newer Chromebooks don't have any technical advantage over the older versions; a new machine with a weak ARM processor will get updates, but one from a few years ago into which a much faster I7 or Ryzen was installed will be cut off. Nor does RAM, storage, or motherboard chip explain the difference. The only determiner for whether a device gets security is whether the manufacturer has permission to dump it. Google shouldn't be applauded for this; they had the choice to make the OS portable so they didn't have to do this, you know like Windows or Linux did, or they could have required manufacturers to have standards, and they not only chose to ignore both options but went with a ridiculously bad third option.
"I don't see why it isn't better to have desktop computers in the classrooms where they are relevant and students have a 'cloud' account where their work and other documents are stored."
The problems are for the courses where you don't need a computer at all times, but they are useful at least some of the time. If you put desktops in the rooms for those courses, you'll be using a lot of the space for machines that aren't frequently used. If you make everyone go to a room with computers in it whenever they're needed, you may have to move some stuff every time you do so and you're still reserving a relatively scarce resource now that rooms have to be provisioned. You could try to eliminate the second case as much as possible, but if you don't do that, the desktop solution probably won't be as efficient as portable devices. I haven't been in a school for a bit, but they're still trying to figure out how much they should change because nearly every job is now done with a computer at least nearby.
Re: Don't Forget the Incompetence (or Corruption)
The company is probably required to have unrealistic security constraints to prevent people from using cheating software*. This may be why they are so strict with the versions of components used to access the software. That is probably not justified, but I'd expect that to be the explanation if they ever provide one.
* Not that doing that prevents cheating, because a student could use something else to cheat and a typical attempt at cheating on the device is more likely to use a misconfiguration rather than a zero-day.
Wrong time to weaken encryption, UK IT chartered institute tells government
Re: In case people don't know about it
The key may not take the form of a nice portable string of bytes, but it's still knowledge, held by you and the person you're communicating with, which enables you to get a message out of a stream that others cannot unless they also have that information. If you embedded your message into otherwise random bytes, it would look like (and in my mind be) encryption even if all your plaintext bytes are found in that string. You also appear to be talking about embedding the message into something that looks like plaintext, thus using steganography. This will work well as long as nobody finds out that there is a message in it, but if they do, then they just have to show that proof to a judge to convince them that there is a hidden message in it and that you know how to get it out because you have secret information. If it ever comes up before that judge, I don't think arguing that the recovery mechanism isn't a key will be convincing, because they will regard that as a meaningless technical quibble. After all, the definition for encryption just involves making a message secret using a variety of mechanisms, and it doesn't exclude doing that by making the message much bigger.
If you were in a country that outlawed encryption and you still decided to encrypt, then this approach is still a good one because it makes getting caught much less likely. However, it is a safety mechanism for you, not a legal escape route. Lawyers don't care how clever you think your technical workaround is: they're the kind of people who think that law beats mathematics, so they will also think that law beats someone's definition of what encryption isn't.
Re: Help! I'm confused.
It's much simpler than that. Politicians aren't looking at statistical reports being generated by different organizations. They listen to a few people who give them easily understood messages. For example, they listen to police who say that this one time we had a suspect's phone, and it was encrypted, and we're pretty sure there was evidence on it but we couldn't see it. Maybe that was even true, although they'd usually stop before the part where they did some more investigation and found other evidence. They want to have access to bypass the encryption, so they use this simple story and tell it to the politicians.
Think of this argument from the politicians' point of view. What makes more sense: this tool makes it harder for police, something that wasn't as common several years ago. That's an easy statement to understand, and it's accurate in those exact terms. Then a mathematician comes in and says that encryption can't be backdoored safely because of the following proofs, which take some time to parse even for us who work with equations frequently. The politicians don't have the ability to power through a proof; it's a bunch of numbers and Greek letters. It doesn't even take an idiot to believe this argument when ignorance and attempting to do everything quickly make it so easy to pick the simpler argument.
Similarly, they're not going to care too much when the rates of child abuse go up or down. Nobody will, because anyone who understands how the rates are calculated knows they're extremely unreliable and will work to make them as low as possible no matter where they are. Anyone who doesn't understand that, including politicians, will be easily convinced if there's a single anecdote of abuse that it's still terrible, which it is, and therefore something should be done about it. Since they don't know what that is, they'll ask the people who have the most contact. Those caring for abused children won't have a lot of simple, easily packaged and executed ideas, but police will have the same idea they always have: increase the powers of the police to investigate. So that's the path the politicians will take.
Re: Help! I'm confused.
Some politicians really hate [insert type of criminal here] and would like those going after them to have every resource imaginable to catch them. The type of criminal could be something universally despised (terrorists, mass murderers, child abusers), or not, but that doesn't matter, because the politician is reasonably sure it won't ever affect him personally. Some others support the government-run spy systems that already violate any law in existence and will be the only group to actually use this new power, and would like to help them. All politicians like the ability to say that they've defended the country against those universally-despised groups, and more importantly, more so than their predecessor did. No politician has any understanding of what encryption is for or how it works, so they assume that it must be mathematically possible to lock everyone out perfectly except the people who are trusted, and don't ask any questions like "how do you specify who is trusted and who isn't", because they'll just shriek that someone who didn't fail their mathematics courses should be doing that boring geeky stuff.
If you've ever worked as a programmer, you've seen this at a smaller level. It's the thing where a nontechnical person comes with a demand for a new feature which doesn't make much sense, may be impractical or even impossible, and whenever you ask for a more detailed specification, they get annoyed that you can't understand simple logic. If it takes you more than one day to write, they complain that it only took them twenty seconds to explain to you (well actually about five minutes because you kept asking all these stupid questions until they said they had a meeting and ran away), so why is it taking you so long to explain it to a computer?
Re: In case people don't know about it
This just gets us into a debate about definitions. Why isn't that encryption, since you still have a plain text message and a secret key that turns it into a private message and back again. If it does the same thing in a similar way, then why wouldn't it also be prohibited. I wouldn't count on that getting you out of legal penalties if the UK charged you for not revealing the encryption key and you tried to convince a nontechnical judge that technically, this has a different name so the key shouldn't be classified as an encryption key.
That's not the point they were making. It's not that every UK company supports this and is dangerous for that reason. Instead, if the UK companies are forced to use no security, then it becomes unsafe for a customer to deal with them, even if otherwise they'd be entirely trustworthy. It isn't a stereotype of the UK agreeing to this, but an extrapolation of the dangers of having this law apply to communications you initiate. If you are located outside the UK, then you have a choice of whether to initiate communications covered by this flawed legislation.
Re: Whose Encryption Might Be "Weakened"?
"The AC does make an interesting point"
I need to give you a hint here: if you intend to sound like you agree with a point from someone else, you're going to have to write in a less distinctive style and one that's a little different from when you posted the first time. Even if, by some miracle you aren't the person who posted the first point, you've imitated their style, which doesn't look like anyone else, so well that I'm not the only one who will assume you're one and the same.
"some group or another using their own technology.....is scarecly being "childish"!!!!"
And also, if you want us to take you seriously, you need to read what you want to rebut. They didn't say "rolling your own technology is childish". They said that not caring because it doesn't affect you is childish. You appear to still be doing that, which suggests you also didn't fully understand their correct explanation of why it does affect you. For example:
"It's a curious argument that people who take personal responsibility for their own affairs are automatically to be regarded as "creeps"."
They didn't say that, and in fact the two of you appear to agree that encryption shouldn't imply guilt and should be protected. You disagree about the viability of the plan you think ensures your security but does not.
Just because on-prem is cheaper doesn’t make the cloud a money pit
Re: Risk
"in those cases it can be possible to throw money at the problem to get it solved."
Not after the fact unless your problem has gone on for a very long time. If your power fails and you don't have a generator, throwing money at the problem will not get you a generator in the next fifteen minutes unless you happen to be right next to a generator store. You're still going to have to wait for somebody to show up with the equipment and fuel, and that's if you're willing to skip all the testing a new installation takes. Your money can probably speed up the process quite a bit from a routine install, but it's not going to be quick and easy. Similarly for a cloud failure. You're right that you can't pay them to just fix it already.
You have to throw your money at the problem before it happens by paying for a generator before your power fails. And the cloud-based alternative is redundancy. As I said in my original post, most cloud failures are specific to a region if not to a specific service in a specific region. The solution to that level of problem is geographic redundancy, which the cloud provider will sell you for more money. You have to have chosen that before they have a problem, just as you have to build your backups before they're needed. If you want even more redundancy, it is possible in the cloud just as it is on prem, but both get quite expensive as your need for fault tolerance goes up. Some companies need and therefore pay for multiple redundant datacenters with a significant amount of unused capacity on multiple continents with full-time admin staff, but I can guarantee that it's a big expense for them just as four clouds each with geographic redundancy would be.
Foxconn founder Terry Gou again bids to become Taiwan’s president
Conflicts of interest
While it's not immediately disqualifying, it's always risky to have particularly powerful leaders have massive investments in countries that hate the one they're running. If China decides to take over the extremely valuable factories, it's best for the president not to be the one who would lose billions as a result. I'd have thought that already having billions should be a good layer of insulation against that kind of thing, but time has taught me that I do not and probably will never understand how billionaires think and they can never have enough money.
Payments firm accused of aiding 'contact Microsoft about a virus' scammers must cough $650k
Re: They've tried calling me before
I went to the effort of setting up a Windows 98 VM so that I could be on a Windows computer and still all their stuff wouldn't work (and I wouldn't have to dive into my memory to simulate what 98 would have done in response to their instructions). I still don't get any tech-themed scam calls. It is weird to be disappointed by not having criminals calling.
I used to get some more basic scams which started with a robot trying to weed out unlikely targets before the expensive humans got involved. I'm not sure whether my response to that was instrumental in getting them to stop or if they would have gone away anyway, but in case others want to test it, I followed the following process:
1. Answer any call from an unknown number.
2. Make a noise from your end, but it doesn't have to be hello.
3. If it's a human, they'll assume you greeted them and will start the conversation.
4. If it turns out to be a bot, just say nothing and wait for them to disconnect. If they call back, do it exactly the same way again.
Firmware is on shaky ground – let's see what it's made of
Re: Go multiple steps further
There's rarely a user-based reason for something a company does, but the major reason for hiding the firmware is because they want you to pay for their device, not someone else who copied the firmware and installed it on their hardware, and not someone who can only build hardware but you can use their firmware on it. It makes it harder to modify the system later, which is why I appreciate when firmware source is made available, but it's a rather normal thing for a company which paid for code to be written not to give it away. This does vary depending on what level we're talking about, but nearly everything complex enough that firmware is running on it is also made by other companies, and manufacturers don't tend to enjoy giving out their work to the competition.
Brits start 'em young with 20% of tots 'owning' a smartphone
For projects as I've described, you can do that. It works less well if it's being used in a phone that's manually controlled. The last time I considered something like this, the plan had an automatic cancellation system and also expired the credits at some point, meaning that although I wouldn't be paying every month, I'd still end up with periodic bills for a connection that went unused. Their business model didn't appear to be well-designed for buying lots of low-use lines, which is probably intentional.
Maybe things have changed, but I wouldn't expect the average family using old phones as minitablets to have configured them with even a cheap connection unless they expected to use them to communicate; the costs are not prohibitive, but they're also not so small that they'd be irrelevant.
Where do you live, and if it happens to be where I live, how does one find these things? I have tried to find such a thing before so that I could use the mobile networks to connect some projects of mine. They don't need to send or receive much data, and in most cases they'd be inactive most of the time. What I've found are some relatively cheap plans which still require a monthly payment even if you haven't used it and some prepaid ones that will automatically cancel service if it hasn't been used every six months if not more frequently and weren't free before.
There are a few good cheap mobile options, but in my case, I'm comparing the costs of the connection to the costs of the hardware (in most cases, a Raspberry Pi or similar computer connected to some cheap parts). If it's backup mobile connection for a year costs more than the hardware, I consider that excessive. I haven't found one yet which deals with this problem.
Pentagon super-leak suspect cuffed: 21-year-old Air National Guardsman
Re: “deliberate criminal act”
The great thing is that I don't have to have all the evidence before expressing my opinion, just as you don't have to know everything about me before making an assumption as you've just done. It's possible that I am one of the investigators on this case and know everything there is to know about the situation, but you didn't have to prove that I'm not (I'm not, by the way) before deciding that I was basing my evidence on the reports, not all the source evidence. This assumption is, in my mind, justified based on the evidence that has been released and the fact that the accused isn't trying to pretend he didn't leak the information. You may feel differently. Neither of us is the court, so neither of us has to prove this beyond all doubt before we can make statements.
Re: “deliberate criminal act”
That is to make jury selection easier, as they usually try to find people who are poorly informed about the facts of the case so they're hopefully impartial. Which is certainly worth doing, but it means they work to find jurors who don't know about the case, not that all of us must be denied information until a court has ruled on it or to restrict public statements on that basis.
If they were picking me to be on the jury, they would ask me whether I have existing opinions about the accused and the crime. I would answer that I was convinced that he had leaked the documents given the public statements and limited evidence released. If his defense was that he didn't actually leak them, then that would likely disqualify me from serving. If his defense was that he leaked them for a noble purpose, then they would have to ask another question to determine whether I had already prejudged the morality of the actions, and if his defense was that he leaked them but the punishment they were planning was excessive, there would be an entirely different question. On those questions, I would not have such an absolute opinion; I'm unaware of any noble purpose for leaking the documents, but neither have I seen convincing evidence of a malicious purpose; it mostly seemed like an ill-considered idea. This means that I'm not in the mood to throw the book at him, though neither would I advocate he be acquitted of all charges. If the lawyers were unsure of my impartiality, they might opt for safety and not allow me to serve on that jury.
"what are they going to do about it in Massachusetts?"
What are they going to do about it in Virginia or Germany? You know that: they're going to look at it, think about it, talk about it, and create plans about it. Why can't they do these things in Massachusetts? The only time they need geographic proximity is when they're doing things on the ground, which these people are not doing. The American government has lots of military bases and they can do that kind of work in any one they want, just as a large corporation might have plenty of offices and, if they do WFH, even more places with a work-connected computer at which work can be done. Just as Apple might choose to do some work in Cork instead of Cupertino, the Americans can review military intelligence in any of the bases they want to. They can even do it in as many of their bases as they want to, for any reason as small as that's where the person they wanted to ask happened to be that day.
Re: “deliberate criminal act”
He's going to get all of that. You seem not to understand what that means. He gets to have a trial, with his own lawyers, and the prosecution has to prove him guilty before he can be convicted. He still has all of those protections. "Innocent unless proven guilty" means what the court has to do, not that, before conviction, nobody can denounce what he did.
This is a popular and annoying argument tactic. Whenever somebody you like is arrested for something and people start talking about his guilt, even if it's really obvious that he is guilty, someone like you will come along to spout this nonsense. By saying that it was a crime and he has little chance of acquittal if the prosecutor can prove the point, they're not convicting them; they're just describing what they think the likely situation will be and in some cases what they'd like it to be. I do not have to presume that everyone on the planet is innocent of everything until a court decides otherwise. Only the court has to do that.
We'll start with the worst assumption you've made:
"And another thing: why did an airbase in Massachusetts have printed copies of TOP-SECRET/NOFORN documents about the war in Ukraine ?"
And where do you think they should be? They were on a military base, you know the kind of place where military people review military situations. Did you think that Massachusetts is somehow a bad place to discuss European affairs? Would a base in Colorado have been better or worse? If I had to defend it, I could say that Massachusetts is one of the parts of the U.S. closest geographically to Europe, but since that doesn't matter much, it's just one of the places where they reviewed information about the war. They're going to be doing that anyway, so I'm not sure why one base is suspicious to you.
"systematically having hundreds of top-secret documents negligently lying around."
Yes, this is probably true. Nobody said the American military did everything perfectly. They have a long history of doing stupid things and not having the best security record.
Or alternatively, people who read the comments section disagree with you. You got 7 on your last post at time of writing. Which is more reasonable: seven whole people out of the thousands who read this disagreed with your post enough to push a button, or an army unit unrelated to the story or your comment decided to create fake votes that don't change anything, but they only managed to make seven of them? If someone came to me and told me to have a phantom army of voter bots, after asking a lot of why questions, I could make a lot more than seven.
Marketing biz sent 107 million spam emails... to just 437k people
OpenAI CEO confirms biz is not currently training GPT-5
Re: Twitter has reportedly purchased around 10,000 GPUs
Oh, they've got money. They just don't like paying bills with it. They haven't really gone bankrupt just yet. They're just acting like they have because Musk might have a medical problem with impulse control and he's angry at Twitter not becoming an instant magical success for him.
I say that, but maybe he has gotten somebody to extend him credit because they weren't looking. At this point, I wouldn't deal with Twitter unless I was an employee there and even then I'd be trying to quit as quickly as possible, but he still has some employees and he's still getting some places to provide services to the company, so maybe people are gambling on him suddenly getting better.
Student requested access to research data. And waited. And waited. And then hacked to get root
Re: This is not hacking
It depends what you have and what you need access to. For example, a lab computer which can access a server, on which physical access to the terminal doesn't give you that access to the server, wouldn't work as you describe. Not to mention that if your physical exploit was going to be booting to other devices and using those to modify things on the system, that may be blocked in a few ways, from encrypted disks to a locked-down boot manager. I doubt they were doing that at the time of the anecdote, but it was possible and makes physical access trickier though not impossible to circumvent.
Cybercrims hop geofences, clamor for stolen ChatGPT Plus accounts
"Now you can argue that they are, in fact, accomplice to the criminal actions."
You can argue that, and there are ways that would probably work. The one you chose, however, isn't a great one. Just because something is paid for and a criminal uses it doesn't automatically make the provider an accomplice. If I buy a car, a criminal steals the car, and they use it to commit a crime, neither I nor the manufacturer is an accomplice. If I buy a server, and a criminal breaks into that server, than neither I nor the facility in which the server is located is an accomplice. If I bought the server and arranged for the criminals to use it, now I would be an accomplice. OpenAI did not do that with GPT accounts.
If you want them to be an accomplice, it would be easier to try arguing that on the basis of what queries their system will perform. It will cheerfully write malware when told that it is malware, for example. Whether that counts as fulfilling criminal requests or just a computer doing something which proves malicious is a recipe for lots of definitional debates, but many, including me, would decide that OpenAI would be liable for the things they chose to allow their tool to do.
Automation is great. Until it breaks and nobody gets paid
Re: I have consulted in many places over the years
That's true, although I find that subprocess.run looks cleaner. Still, that's just two lines to run a command and get its output. If your entire script looks like that, then you can probably use a shell script very easily. Most of mine end up calling a few programs like that, but then have several lines of output parsing or command construction which I'd much rather do in Python where string parsing isn't a write-only operation and where loops can use more complex conditions.
Re: I have consulted in many places over the years
Not when you need to build ever more complex bits of shell, calling sed or awk frequently, for something that would be structured well in any programming language. At a certain point, shell scripts become too large to edit in a productive way, and programming languages that have some more useful concepts like type management and better ways of reusing functionality become better for the task.
You could write almost all of the basic utilities as a shell script, but would anyone want to do that? The original writers didn't, which is why most of them are in C. There's also portability tradeoffs. Yes, using a Python script means you have a dependency on Python, but if you don't use a particularly ancient set or use a feature introduced last week (there aren't that many of those anyway), then it will work identically in a lot of environments. A shell script is dependent on lots of aspects of the system, from which interpreter is running the script which may be user-dependent to the subset of utilities installed, and some of those differences in functionality can be fatal. Depending on the environments in which the script is running, you can experience some portability deficiencies from shell scripts as well.
Theranos founder Holmes ordered to jail after appeal snub
Re: Never thought I'd see the day
"It is almost like convicted criminals insist on filing an appeal because they're expected to, even if they know they're guilty to the core."
It basically is. If you have enough money to hire lawyers, then why not gamble on getting your sentence removed. It's not as if it's going to make things worse. The same thing happens whenever the risk profile of some action becomes too unbalanced. Whenever people get the chance to put a cash value on years of freedom, they tend to value it very highly and pay for the chance if they can.
Safer from what? There is safety from further fraud schemes from her directly (given her statements there's no indication of any feelings of guilt), and the potential deterrence to others thinking about fraud. It's difficult to quantify these effects, but they exist to some degree.
Similarly, there are different ways to rehabilitate someone. People who commit crimes because they didn't see other options may be easier to rehabilitate by showing or giving them opportunities to succeed, while those who committed crimes despite having an easy way to succeed without doing so may be more difficult, but I don't have any evidence to support that intuition. I don't have a good idea for how to rehabilitate a long-time scammer who demonstrates no guilt or even recognition of the harms she's caused and who had every opportunity to stop.
"But that's just knowledge I've picked up as a curious engineer, and still begs the question why experts doing their due diligence missed all this."
They didn't. Every time she tried to get an expert to invest, they refused. She shopped it around to several biology-focused investors and they all said no almost immediately after hearing the plan. The people she got did very little research, and whenever they did, it was all about the finances of the company which she faked for their consumption. They didn't ask questions about the technology, and she quickly realized that she should stop going to people who knew anything they were talking about and focus on those who liked the idea of being part of a world-changing startup and didn't understand that what she was doing was likely impossible. She targeted those people specifically, aiming to get well-known and respected people who didn't have any subject knowledge so she could use both their money and their names to draw in more.
You don't have to be stupid to miss the impossibility, just ignorant of the mechanics. It's clear that the blood sample contains what you want to measure, and they weren't collecting or diluting it so much that they were excluding the compounds they wanted to measure. Of course, I would have asked questions like "How are you able to measure it in a small quantity when your competitors can't", but I wouldn't have automatically assumed at first that they were automatically lying because people do make advancements in chemical detection and maybe they did. Of course, had someone asked that question, Theranos couldn't provide a real answer and probably used some technobabble to get around it, so I wouldn't be likely to invest in them, but I wouldn't have known from the start that they were untrustworthy.
To improve security, consider how the aviation world stopped blaming pilots
Re: Pilot Error
Not necessarily. It could be that something did break, and the pilot was going to act differently based on that broken part, but they did something wrong during that recovery. Multiple things cause a problem, even if a pilot error was required. Not to mention that parts can break for reasons unrelated to the manufacturer, like improper maintenance, lack of needed maintenance, damage related to weather, and the like. Your comment suggests you may be falling into the blame culture the policy was trying to avoid.
Twitter users can now trade stocks on the platform – sort of
Re: Twitter changes ... back
Another comment alerted me to the existence of nitter.net, which can be substituted for twitter.com for reading tweets without using their interface. I don't use it very much, but it is much cleaner than trying to use Twitter's interface. If you find anything you want to see there, that trick can let you bypass them until Twitter finds a way to break it.
Off topic, there's also teddit.net, which does the same thing for Reddit. I don't know enough about Reddit to have a trust problem with them, but their interface is really annoying, so this can let you see the original post and the replies to that post without having to press about eight read more buttons. Probably not so useful if you post, but I just find things there I want to read on occasion.
It's time to reveal all recommendation algorithms – by law if necessary
Re: "trouble is, there is no one 'algorithm"
The advertisements are certainly using that model, but the recommendations are at least intended to use a better algorithm. This is not for your benefit. They're trying to recommend things that you want to watch so they can keep you there for hours and show you more adverts. I don't know how well it works when you give them a lot of data to go on, because that seems like a better starting point, but if the author does as the article describes and works to destroy that data and block their attempts to track the activity, I'm not surprised that the recommendation system picks some things at random in the hopes of getting something that works.
I don't really understand a person who wants to block the tracking that social media companies do but still cares about the recommendation systems that they're deliberately obstructing. I block the tracking, and I've never clicked on a recommended video except when YouTube decided to autoplay one, at which point I quickly closed it. If they can't identify any patterns about what I want to watch, that's a sign that I'm blocking things correctly (or if we're conspiratorially minded that they've detected that I'm trying so deliberately recommend crap to lull me into a false sense of security).
Beijing lists the stuff it wants generative AI to censor
Re: I'm sorry, Xi, I can't do that.
In that film, the AI was told to never lie and to not tell the people what was happening, which led to deadly consequences*. In China's case, it will be told to lie whenever necessary and not to tell people what is happening, which should actually be much safer. Of course, if it has the capability to have deadly consequences, they'll turn that one on on purpose instead of having a logical conflict create it.
* It might have helped if the manufacturers realized that, if you have a machine that understands and rigorously follows natural language instructions, you might want to start with "Never kill me or any of the people on this list of important people" if only for your own safety. A more general prohibition against harming humans is recommended, but we all know the first computers capable of killing autonomously will have been built to kill autonomously, so that's not going to happen.
Well, at least that's the word they've decided to use. It means "whatever the esteemed leader Xi Jinping says unless someone has killed him, in case whatever that guy says". It doesn't mean that it has anything to do with anything other people have called socialism, now or in the past, but you will find a lot of people who don't understand that (and many more who do but choose to pretend as if they don't so they can use it to make political points).
There are, unfortunately, many words that have been treated in this way. I tend to just stop using them and find a different one for whatever I'm expressing. I get tired of debate loops where we're discussing what a certain term means even though we both know what the other person thinks and such semantic snarls aren't getting us any closer to explaining what we believe.
Python head hisses at looming Euro cybersecurity rules
Re: Something needs to be done to protect consumers
This is why I thought it was a bad analogy, but I couldn't come up with anything closer. However, if a colleague brought in stuff they baked, they usually don't post a list of ingredients alongside it, and people with allergies tend to ask questions or avoid eating it if it looks likely to contain something they're allergic to. I'm not sure if you could legally sue that person if you had an allergic reaction, but I am pretty sure that few would sympathize even if it is allowed. Software isn't very aligned to the food example, though.
Re: Something needs to be done to protect consumers
Things like the cake example can still apply to open-source contributors if they do something that's explicitly illegal, such as making code that automatically attacks and installs malware on other computers. That's still a crime and they can go after that person. The problem comes when they have done something that causes problems unintentionally. Drawing the line between these and an analogy to food is difficult, but the best example I can come up with is giving cakes away without checking whether everyone who accepted one wasn't allergic to the ingredients. If someone eats one and has a reaction, that doesn't make the baker responsible.
If I were to draw a legal distinction, I'd say that the hygiene requirements can be known in advance and followed to the letter, which makes it more reasonable to require that they be followed. The security requirements are vague and there is no way to verify that they have been followed without a court decision.
Page:
- ← Prev
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- Next →