Skip to content

You're not alone: This email from Google's Gemini team is concerning

Technology
298 182 3.7k
  • Why Every University Needs a Robust Library Software

    Technology technology
    2
    5 Stimmen
    2 Beiträge
    37 Aufrufe
    D
    What are you hoping to accomplish by pasting AI generated word soup here?
  • Funny AI Love Calculator - try out it funny.

    Technology technology
    1
    2
    1 Stimmen
    1 Beiträge
    26 Aufrufe
    Niemand hat geantwortet
  • 349 Stimmen
    72 Beiträge
    892 Aufrufe
    M
    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything. HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.
  • Could Windows and installed apps upload all my personal files?

    Technology technology
    2
    1 Stimmen
    2 Beiträge
    28 Aufrufe
    rikudou@lemmings.worldR
    Yes, every application has access to everything. The only exception are those weird apps that use the universal framework or whatever that thing is called, those need to ask for permissions. But most of the apps on your PC have full access to everything. And Windows does collect and upload a lot of personal information and they could easily upload everything on your system. The same of course applies for the apps as well, they have access to everything except privileged folders (those usually don't contain your personal data, but system files).
  • Napster/BitTorrent for machine learning?

    Technology technology
    3
    1
    27 Stimmen
    3 Beiträge
    44 Aufrufe
    G
    What would a use case look like? I assume that the latency will make it impractical to train something that's LLM-sized. But even for something small, wouldn't a data center be more efficient?
  • My AI Skeptic Friends Are All Nuts

    Technology technology
    31
    1
    13 Stimmen
    31 Beiträge
    321 Aufrufe
    J
    I did read it, and my comment is exactly referencing the attitude of the author which is "It's good enough, so you should use it". I disagree, and say it's another dumbass shortcut to cash grab on a less than stellar ecosystem and product. It's training wheels for failure.
  • 168 Stimmen
    11 Beiträge
    112 Aufrufe
    A
    Law enforcement officer
  • 168 Stimmen
    47 Beiträge
    768 Aufrufe
    4
    Found it in my settings, not sure how I’ve missed it. Been a Bitwarden user since the first LastPass hack.