Skip to content

Telegram, the FSB, and the Man in the Middle: The technical infrastructure that underpins Telegram is controlled by a man whose companies have collaborated with Russian intelligence services.

Technology
12 10 109
  • UK Plans AI Experiment on Children Seeking Asylum

    Technology technology
    12
    1
    79 Stimmen
    12 Beiträge
    33 Aufrufe
    A
    Companies that tested their technology in a handful of supermarkets, pubs, and on websites set them to predict whether a person looks under 25, not 18, allowing a wide error margin for algorithms that struggle to distinguish a 17-year-old from a 19-year-old. AI face scans were never designed for children seeking asylum, and risk producing disastrous, life-changing errors. Algorithms identify patterns in the distance between nostrils and the texture of skin; they cannot account for children who have aged prematurely from trauma and violence. They cannot grasp how malnutrition, dehydration, sleep deprivation, and exposure to salt water during a dangerous sea crossing might profoundly alter a child’s face. Goddamn, this is horrible. Imagine leaving shitty AI to determine the fate of this girl : 'Psychologically broken,' 8-year-old Sama loses her hair
  • 25 Stimmen
    1 Beiträge
    18 Aufrufe
    Niemand hat geantwortet
  • 737 Stimmen
    67 Beiträge
    1k Aufrufe
    K
    That has always been the two big problems with AI. Biases in the training, intentional or not, will always bias the output. And AI is incapable of saying "I do not have suffient training on this subject or reliable sources for it to give you a confident answer". It will always give you its best guess, even if it is completely hallucinating much of the data. The only way to identify the hallucinations if it isn't just saying absurd stuff on the face of it, it to do independent research to verify it, at which point you may as well have just researched it yourself in the first place. AI is a tool, and it can be a very powerful tool with the right training and use cases. For example, I use it at a software engineer to help me parse error codes when googling working or to give me code examples for modules I've never used. There is no small number of times it has been completely wrong, but in my particular use case, that is pretty easy to confirm very quickly. The code either works as expected or it doesn't, and code is always tested before releasing it anyway. In research, it is great at helping you find a relevant source for your research across the internet or in a specific database. It is usually very good at summarizing a source for you to get a quick idea about it before diving into dozens of pages. It CAN be good at helping you write your own papers in a LIMITED capacity, such as cleaning up your writing in your writing to make it clearer, correctly formatting your bibliography (with actual sources you provide or at least verify), etc. But you have to remember that it doesn't "know" anything at all. It isn't sentient, intelligent, thoughtful, or any other personification placed on AI. None of the information it gives you is trustworthy without verification. It can and will fabricate entire studies that do not exist even while attributed to real researcher. It can mix in unreliable information with reliable information becuase there is no difference to it. Put simply, it is not a reliable source of information... ever. Make sure you understand that.
  • 115 Stimmen
    22 Beiträge
    321 Aufrufe
    omegalemmy@discuss.onlineO
    American individualism is when you believe everyone is as bad as you or worse Self-fulfilling prophecy when they never want to cooperate in fear of being ripped off
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    508 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • New Supermaterial: As Strong As Steel And As Light As Styrofoam

    Technology technology
    21
    1
    60 Stimmen
    21 Beiträge
    251 Aufrufe
    D
    I remember an Arthur Clarke novel where a space ship needs water from the planet below. The easiest thing is to lower cables from space and then lift some ice bergs.
  • 0 Stimmen
    7 Beiträge
    73 Aufrufe
    C
    Domain or azure ad join is what I'm used to, but for personal machines and friends/family I do local accounts.
  • 0 Stimmen
    3 Beiträge
    46 Aufrufe
    V
    how does the author find it surprising in the slightest that it's easy to live without...