vk6flab

joined 8 months ago
[–] [email protected] 2 points 16 hours ago (1 children)

I'm not eligible to vote in your country. In mine, voting is mandatory and there are no stickers, just democracy sausages to aid in the funding for local polling places like schools and community halls.

https://en.m.wikipedia.org/wiki/Democracy_sausage

[–] [email protected] 4 points 2 days ago

The thing about free speech is that there's a whole lot of legislation surrounding it. At the moment, every single fediverse instance is run by( a small group of) people, many of them are run by individuals who are legally responsible for the content that's posted on their site.

In addition, the Digital Millennium Copyright Act, better known as the DMCA and the General Data Protection Regulation, the GDPR, have requirements for people who own and publish data, like the people who run instances, not to mention privacy acts and myriad other provisions and laws.

Non compliance is very easy and costly, so instances who are aware of this are cautious in what they allow on their instance.

Finally, many instances want to create a community with a social cohesion and associated standards that they, depending on the level, encourage or enforce.

Why any instance bans something at any one time can generally be traced back to these reasons.

Of course there are also instances where it's completely open season. Don't expect these to stick around once lawyers get involved.

[–] [email protected] -4 points 2 days ago

It appears that the OP is incapable of discovering Adobe Acrobat.

[–] [email protected] -5 points 3 days ago (2 children)

It's not an app, the technology you described is called a "PDF form".

[–] [email protected] 6 points 4 days ago

If you don't have any hair, it won't change colour..

(It's a joke, laugh)

Also, not for nothing, the human body changes daily. I'd recommend that you get used to it before you have an unhappy life pursuing battle against the inevitable.

[–] [email protected] -5 points 5 days ago (1 children)

Not sure how I feel about such a bot. I can see potential security issues arising in relation to stored relationships between users and posts.

[–] [email protected] 12 points 6 days ago (1 children)

I'm fairly sure that the price information shown on a Google Search result page is advertising that comes from a different source than the results do.

As far as I know, you could write a plugin for SearXNG to query suppliers and format the output as required.

I think that Google Shopping might be queried in the same way, but I've never looked into it deeply.

[–] [email protected] 1 points 6 days ago (1 children)

No, you didn't "edit" your mistake, you completely changed the meaning of your response which makes anything after it look absurd.

You originally stated that an algorithm was intelligence, the implication being that using your logic, you thought that a calculator was intelligent.

As far as the meaning of AI, you clearly don't understand the landscape surrounding the hyperbolic assertions made by ignorant journalism about the topic.

Machine learning is one aspect of the landscape, useful as it is, intelligence it is not.

LLM emissions on the other hand appear to emulate enough grammatically correct language to fool many people some of the time, leading to their mistaken belief that what is happening is intelligence rather than, at least from their perspective, magic.

(Any sufficiently advanced technology is indistinguishable from magic. -- Arthur C. Clarke)

So, intelligence it is not, Assumed Intelligence is what it is, or autocorrect gone uppity if you prefer, an algorithm either way.

[–] [email protected] 7 points 1 week ago (6 children)

Ignorance is bliss..

A.I. means Assumed Intelligence, despite what you might have read elsewhere. Using it to do "research" is how you're going to get first hand experience with so-called "hallucinations".

But you do you..

[–] [email protected] 10 points 1 week ago (6 children)

As opposed to Arabic speakers in the other party?

 

A cookie notice that seeks permission to share your details with "848 of our partners" and "actively scan device details for identification".

 

How are you storing passwords and 2FA keys that proliferate across every conceivable online service these days?

What made you choose that solution and have you considered what would happen in life altering situations like, hardware failure, theft, fire, divorce, death?

If you're using an online solution, has it been hacked and how did that impact you?

 

My search has been without results.

My "new" model remote with a Siri button keeps needing to be reset to control my infrared amplifier. Press and hold the Volume Down and TV button works, but it's annoying when you want to change the volume whilst watching something and it doesn't respond.

Firmware version is 0x83.

Anyone got any ideas what might be causing this?

 

There is a growing trend where organisations are strictly limiting the amount of information that they disclose in relation to a data breach. Linked is an ongoing example of such a drip feed of PR friendly motherhood statements.

As an ICT professional with 40 years experience, I'm aware that there's a massive gap between disclosing how something was compromised, versus what data was exfiltrated.

For example, the fact that the linked organisation disclosed that their VoIP phone system was affected points to a significant breach, but there is no disclosure in relation to what personal information was affected.

For example, that particular organisation also has the global headquarters of a different organisation in their building, and has, at least in the past, had common office bearers. Was any data in that organisation affected?

My question is this:

What should be disclosed and what might come as a post mortem after systems have been secured restored?

 

Anyone know of any scriptable asynchronous communication tools?

The closest so-far appears to be Kermit. It's been around since CP/M, but apparently there's still no centralised language reference and the syntax predates Perl.

25
submitted 6 months ago* (last edited 6 months ago) by [email protected] to c/[email protected]
 

U2F keys can be purchased online for the price of a cup of coffee. They're being touted as the next best thing in online security authentication.

How do you know that the key that arrives at your doorstep is unique and doesn't produce predictable or known output?

There's plenty of opportunities for this to occur with online repositories with source code and build instructions.

Price of manufacturing is so low that anyone can make a key for a couple of dollars. Sending out the same key to everyone seems like a viable attack vector for anyone who wants to spend some effort into getting access to places protected by a U2F key.

Why, or how, do you trust such a key?

The recent XZ experience shows us that the long game is clearly not an issue for some of this activity.

 

Genie: There are 3 rules... no wishing for death, no falling in love, no bringing back dead people.

Me: I wish envelopes would moan when you lick them.

Genie: There are 4 rules...

view more: next ›