• 0 Posts
  • 23 Comments
Joined 1 year ago
cake
Cake day: July 25th, 2023

help-circle







  • While you make a valid point here, mine was simply that once something is out there, it’s nearly impossible to remove. At a certain point, the nature of the internet is that you no longer control the data that you put out there. Not that you no longer own it and not that you shouldn’t have a say. Even though you initially consented, you can’t guarantee that any site will fulfill a request to delete.

    Should authors and artists be fairly compensated for their work? Yes, absolutely. And yes, these AI generators should be built upon properly licensed works. But there’s something really tricky about these AI systems. The training data isn’t discrete once the model is built. You can’t just remove bits and pieces. The data is abstracted. The company would have to (and probably should have to) build a whole new model with only propeely licensed works. And they’d have to rebuild it every time a license agreement changed.

    That technological design makes it all the more difficult both in terms of proving that unlicensed data was used and in terms of responding to requests to remove said data. You might be able to get a language model to reveal something solid that indicates where it got it’s information, but it isn’t simple or easy. And it’s even more difficult with visual works.

    There’s an opportunity for the industry to legitimize here by creating a method to manage data within a model but they won’t do it without incentive like millions of dollars in copyright lawsuits.









  • JonEFive@midwest.socialtoPrivacy Guides@lemmy.one2FA app
    link
    fedilink
    English
    arrow-up
    6
    ·
    1 year ago

    Then what do you use for your password manager?

    I’ve always been of the mindset that storing your 2fa next to your passwords at least partially defeats the purpose of 2fa.

    The two types of attacks I worry about would be a hacked/leaked password from a third party site, or your password manager being compromised. While the latter is far less likely, it is still something I’d like to protect myself from as much as possible.



  • Know your school handbook and acceptable use policy inside and out. Same with any other published guidelines they provide. My bet is that their AUP says something about not circumventing their security and monitoring tools. Booting into a live OS would certainly fall into that category. But knowing what the rules actually say is probably the first thing you should do since you don’t own the hardware or network. From there, you can decide how far you really want to go and if there are any defenses or loopholes in the rules.

    Getting your own hardware is probably your best option in this case if you can do so.