Skip to content

Is the U.S. Vulnerable to a Drone Sneak Attack?

Technology
33 19 298
  • 126 Stimmen
    7 Beiträge
    71 Aufrufe
    M
    They don't have fiddle heads
  • Are a few people ruining the internet for the rest of us?

    Technology technology
    25
    1
    236 Stimmen
    25 Beiträge
    444 Aufrufe
    H
    [image: ec1c05b8-0650-4b4b-b52a-dd9eb7ed9d02.png]
  • 349 Stimmen
    72 Beiträge
    699 Aufrufe
    M
    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything. HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.
  • Delivering BlogOnLemmy worldwide in record speeds

    Technology technology
    3
    28 Stimmen
    3 Beiträge
    40 Aufrufe
    kernelle@0d.gsK
    Nice to hear! I'm glad you enjoyed it.
  • 111 Stimmen
    24 Beiträge
    310 Aufrufe
    O
    Ingesting all the artwork you ever created by obtaining it illegally and feeding it into my plagarism remix machine is theft of your work, because I did not pay for it. Separately, keeping a copy of this work so I can do this repeatedly is also stealing your work. The judge ruled the first was okay but the second was not because the first is "transformative", which sadly means to me that the judge despite best efforts does not understand how a weighted matrix of tokens works and that while they may have some prevention steps in place now, early models showed the tech for what it was as it regurgitated text with only minor differences in word choice here and there. Current models have layers on top to try and prevent this user input, but escaping those safeguards is common, and it's also only masking the fact that the entire model is built off of the theft of other's work.
  • Meta publishes V-Jepa 2 – an AI world model

    Technology technology
    3
    1
    9 Stimmen
    3 Beiträge
    39 Aufrufe
    K
    Yay more hype. Just what we needed more of, it's hype, at last
  • A ban on state AI laws could smash Big Tech’s legal guardrails

    Technology technology
    10
    1
    121 Stimmen
    10 Beiträge
    94 Aufrufe
    P
    It's always been "states rights" to enrich rulers at the expense of everyone else.
  • 0 Stimmen
    4 Beiträge
    47 Aufrufe
    redfox@infosec.pubR
    Yeah, damn, I always forget about that...just like they want...