
EFF missed a fun opportunity to call the Rayhunter “DeCSS”.
EFF missed a fun opportunity to call the Rayhunter “DeCSS”.
There’s only one way to solve all diseases.
Did they test this on Mars first?
Most major content producers have agreements with YouTube such that as their content is discovered, monetization all goes to the rights holders. In general, this seems like a pretty good idea, and better than copyright maximalism.
However, I’ve had original works of my own “monetized by rights holder” because they used my work (with permission) in one of their products, and so now have co-opted all expressions of my work on YouTube. So the system isn’t perfect.
This isn’t leaving tech… it’s leaving corporate employment.
Still great options, but I was expecting something more like: pivot to a different role in your existing company and then find another non-corporate use for those skills, or get your apprenticeship in the trades, or become a bus driver.
Or maybe Putin.
May??? They’ve been targeting them for years!
I wonder how much of that can be traced back to Broadcom acquiring VMWare?
Isn’t that headline backwards? Isn’t it Moscow saying Russia has occupied the region?
All religions, or just officially recognized ones?
Because there’s plenty of modern religions out there that claim to be anti-religion. Groupthink hiding behind ideologies that are fine in and of themselves, but twisted to keep people in line.
The problem isn’t religion; it’s people.
Bridge mode disables the router in the modem; if you have an admin account on the modem you should be able to enable it yourself; otherwise you need to get your ISP to enable it. It will turn off all the firewall and WiFi features on the modem.
You need to use their modem quite often, but you don’t need to use their router. They’re usually “all in one” modem/router things these days, but they’re legally required to provide you with a modem in bridge mode if you ask — at that point, an Ethernet cable attached to their modem is effectively attached to the Internet, and you can put your own hardware inside (firewall, Wifi router, etc.).
While you need to connect to their IP gateway, you don’t need to use their DNS services or anything but their IP gateway service.
It doesn’t really matter… the data is managed by a third party in another country. I have no real control over who gets access to it, intentionally or otherwise. Better that the data just doesn’t exist in the first place.
Well yeah. That’s what their tech does. And it’s why I have my ISP’s WiFi offering disabled and the antennas removed and run their router in bridged mode, hooked up to equipment I own that doesn’t call out to the Internet.
Remember that fingerprinting can be your friend… because it’s much easier to fake an online fingerprint than a real one.
You can generate a unique fingerprint with each online interaction; this means that you will always have a unique identity.
Or, you can ensure you always have the same fingerprint as a large number of other people.
Think of it as the difference between using a different valid loyalty card each time you shop vs using one of the famous numbers that millions of other people are also using.
Of course, in both circumstances, you do give up the benefits of being uniquely identifiable.
Exactly. People see “AI” and think LLMs and diffusion models. Those are both probabilistic translation engines. They’re no more intelligent than an AC/DC converter, just a lot more complex.
However, there are neural networks and sense arrays in the field of AI, and those are designed to replicate the process of thought.
The real route to a thinking AI is likely a combination of the two, where a neural network can call on expert systems including translation engines to do the heavy lifting and then run a more nuanced decision tree over the results.
Thing is, modern LLMs and diffusion models are already more complex than a single human mind can fully comprehend, so we default to internally labelling them as either “like us” or “magic”, even when we theoretically know them to be nothing but really deep predictive models.
Little Snitch on a Mac.
There are an infinite number of programs that could do this. Will they? Probably not.
Best thing is to install a trustworthy personal firewall, and block all outbound network access for all processes, and then enable as needed. This won’t stop Windows itself, but it will give you a heads-up if something else is trying to send data somewhere and you can make an informed choice at the time.
Why over 11?
In the time it takes for all this to play out, all the farmers could recoup their potential losses and then some by replacing their JD investment with Kubota, who supports independent repair shops.
Of course, with the debt load most farmers carry, that’s easier said than done.
If the federal government set up a replacement program though, and shipped all the JD machinery to Ukraine where hackers know how to modify the software, everyone but JD would win.
Well I see a problem there. It doesn’t specify the cause of the danger or the reason the person is in danger in the first place.