Gotcha, thanks for explaining!
Gotcha, thanks for explaining!
Wait how is what you’re proposing different from ICE hybrids?
the religion that gets you the most stuff in the afterlife.
I think it would be rather the opposite, should be the one that promises the worst fate in the afterlife to non-believers
Iirc,mass effect lets you buy anything you miss in a store later, at least
Except if you continue reading beyond your Quote, it goes on to explain why that actually doesn’t help.
is a pretty good indication that the author(s) are deeply racist
Or, maybe, they’re just using the most well-known instance of fascism in history as a concrete example, in order to not overcomplicate the message. Jumping to accusations of racism at the slightest suspicion is not gonna help anyone.
Companies and their legal departments do care though, and that’s where the big money lies for Microsoft when it comes to Windows
Training and fine tuning happens offline for LLMs, it’s not like they continuously learn by interacting with users. Sure, the company behind it might record conversations and use them to further tune the model, but it’s not like these models inherently need that
Na ja, dein “wer da drinne das 2fa feature nutzt hat das konzept von 2fa nicht verstanden” klingt – gerade für Laien – schon sehr nach “dann kann man es auch gleich lassen”. Das wollte ich nur richtig stellen.
wer da drinne das 2fa feature nutzt hat das konzept von 2fa nicht verstanden.
Das würde ich nicht so hart sehen, 2FA im PW-Manager ist immer noch um Welten besser als kein 2FA, und für viele Normalos kannst du nichts komplizierteres als das empfehlen weil sie es sonst halt gar nicht benutzen würden.
Passwörter können auf verschiedenen Wegen in die falschen Hände geraten, 2FA im Passwortmanager schützt immer noch prima gegen alle davon, außer halt wenn der Passwortmanager selbst geknackt wird. Und wenn das passiert, ist die Wahrscheinlichkeit hoch, dass der Angreifer es eh auch schon in eins meiner Geräte reingeschafft hat, und somit auch Zugriff auf eine etwaige getrennte 2FA-App hat. Um das zu verhindern, muss es dann halt wirklich schon die Yubikey-Lösung sein, was aber wiederum aktuell nichts ist, was die Non-Techies in meinem Leben realistisch tatsächlich benutzen würden.
Edit: für meine Argumentation ist es wichtig dass du nicht ohne eins meiner Geräte in den PW-Manager reinkommst, aka das Modell von 1Password. Ich glaube Proton Pass ist nicht ganz so gut abgesichert, weil deine Daten da nur mit dem normalen Account-Passwoet verschlüsselt sind, nicht nochmal mit nem extra-Key
The Lego group themselves, for one
And it makes sense to me that a business would leverage that data in ways to benefit themselves.
Big fat nope on that one. This is exactly what the GDPR is about. I’m giving you my data for a specific purpose, and unless I tell you otherwise, you have no fucking business using that data for anything else. Gonna be interesting to see how this one plays out in the EU.
Happened with Lone Echo for me. It’s a VR game where you’re in a space station, and you move around in zero g by just grabbing your surroundings and pulling yourself along or pushing yourself off of them. I started reflexively attempting to do that in real life for a bit after longer sessions
Except the email in question is not a newsletter. Companies often use separate mail list services for important product announcements and similar things as well. Obviously there should be a process in place that removes you from these external services too when you delete your account, but I assume this is what broke down in this case
Seems like clients vary wildly in how they interpret this markup. This is how it shows on Sync:
And science fiction somehow can’t be fascist?
I was thinking of an approach based on cryptographic signatures. If all images that come from a certain AI model are signed with a digital certificate, you can tamper with metadata all you want, you’re not gonna be able to produce the correct signature to add to an image unless you have access to the certificate’s private key. This technology has been around for ages and is used in every web browser and would be pretty simple to implement.
The only weak point with this approach would be that it relies on the private key not being publicly accessible, which makes this a lot harder or maybe even impossible to implement for open source models that anyone can run on their own hardware. But then again, at least for what we’re talking about here, the goal wouldn’t need to be a system covering every model, just one that makes at least a couple models safe to use for this specific purpose.
I guess the more practical question is whether this would be helpful for any other use case. Because if not, I hardly doubt it’s gonna be implemented. Nobody is gonna want the PR nightmare of building a feature with no other purpose than to help pedophiles generate stuff to get off to “safely”, no matter how well intentioned
Yeah but the point is you can’t easily add it to any picture you want (if it’s implemented well), thus providing a way to prove that the pictures were created using AI and no harm has been done to children in their creation. It would be a valid solution to the “easy to hide actual CSAM between AI generated pictures” problem.
It looks like they opened the door normally, until the motorcycle got caught on it and forced it all the way open