Skip to content

Proton’s Lumo AI chatbot: not end-to-end encrypted, not open source

Technology
133 63 33
  • 47 Stimmen
    1 Beiträge
    19 Aufrufe
    Niemand hat geantwortet
  • How Apple’s iOS 26 and Google’s Android 16 Will Change Our Phones

    Technology technology
    17
    8 Stimmen
    17 Beiträge
    224 Aufrufe
    adespoton@lemmy.caA
    The one thing I’m continually annoyed about though is battery management. Why, in this day and age, do we not have a smartphone that can last on a single charge for a week? Instead, after a year or two of use, the devices with a glued in battery can barely last 8 hours on a charge. Doesn’t seem all that smart.
  • 66 Stimmen
    2 Beiträge
    32 Aufrufe
    W
    In April, Nigeria asked Google, Microsoft, and Amazon to set concrete deadlines for opening data centers in the country. Nigeria has been making this demand for about four years, but the companies have so far failed to fulfill their promises. Now, Nigeria has set up a working group with the companies to ensure that data is stored within its shores. Just onshoring the data center does not solve the problems. You can't be sure no data travels to the US servers, some data does need to travel to the US servers, and the entire DC is still subject to US software and certificate keychains. It's better, but not good or safe. I need to channel my inner Mike Ehrmantrout to the US tech companies and government: you had a good thing going you stupid son of a bitch. You had everything you needed and it all ran like clockwork. You could have shut your mouth, cooked, and made as much money as you needed, but you just had to blow it up, you and your pride and your ego. Seriously, this is a massive own goal by the US government. This is a massive loss to US hegemony and influence around the world that's never coming back. It has never been easier to build sovereign clouds with off the shelf and open source tooling. The best practices are largely documented, software is commoditized, and there are plenty of qualified people out there these days and governments staring down the barrel of existential risk have finally got the incentive to fund these efforts.
  • 33 Stimmen
    6 Beiträge
    78 Aufrufe
    G
    Yes. I can't imagine that they will go after individuals. Businesses can't be so cavalier. But if creators don't pay the extra cost to make their models compliant with EU law, then they can't be used in the EU anyway. So it probably doesn't matter much. The Llama models with vision have the no-EU clause. It's because Meta wasn't allowed to train on European's data because of GDPR. The pure LLMs are fine. They might even be compliant, but we'll have to see what the courts think.
  • 132 Stimmen
    16 Beiträge
    146 Aufrufe
    V
    Ah, yes. That's correct, sorry I misunderstood you. Yeah that's pretty lame that it doesn't work on desktop. I remember wanting to use that several times.
  • Russian Lawmakers Authorize Creation Of National Messaging Service

    Technology technology
    13
    1
    34 Stimmen
    13 Beiträge
    124 Aufrufe
    C
    Are there substantial numbers of Russians who seriously wouldn't be wise to this?
  • 347 Stimmen
    51 Beiträge
    701 Aufrufe
    4
    Interestingly it loads today. I have AdAway on my phone and PiHole in my home network
  • 44 Stimmen
    4 Beiträge
    50 Aufrufe
    G
    It varies based on local legislation, so in some places paying ransoms is banned but it's by no means universal. It's totally valid to be against paying ransoms wherever possible, but it's not entirely black and white in some situations. For example, what if a hospital gets ransomed? Say they serve an area not served by other facilities, and if they can't get back online quickly people will die? Sounds dramatic, but critical public services get ransomed all the time and there are undeniable real world consequences. Recovery from ransomware can cost significantly more than a ransom payment if you're not prepared. It can also take months to years to recover, especially if you're simultaneously fighting to evict a persistent (annoyed, unpaid) threat actor from your environment. For the record I don't think ransoms should be paid in most scenarios, but I do think there is some nuance to consider here.