He did… But he does not have the authority.
He did… But he does not have the authority.
I mean… It’s Las Vegas. You don’t go to Vegas expecting a vacation experience free from the perverse corruption of money.
The only difference is who pays you to do it 😁
Was definitely not expecting to see this copy pasta here.
Exactly. “My opinion is different from your life experience, and by showing me that fact first hand, you have made me uncomfortable.”
And as we all know, being uncomfortable because of another person is an attack. Irony of ironies, imagine how uncomfortable people must make that kid all the time, including this specific interaction.
i’m the bestest browser guys, i swear. source: trust me bro.
Microsoft Edge has entered the chat
While you make a valid point here, mine was simply that once something is out there, it’s nearly impossible to remove. At a certain point, the nature of the internet is that you no longer control the data that you put out there. Not that you no longer own it and not that you shouldn’t have a say. Even though you initially consented, you can’t guarantee that any site will fulfill a request to delete.
Should authors and artists be fairly compensated for their work? Yes, absolutely. And yes, these AI generators should be built upon properly licensed works. But there’s something really tricky about these AI systems. The training data isn’t discrete once the model is built. You can’t just remove bits and pieces. The data is abstracted. The company would have to (and probably should have to) build a whole new model with only propeely licensed works. And they’d have to rebuild it every time a license agreement changed.
That technological design makes it all the more difficult both in terms of proving that unlicensed data was used and in terms of responding to requests to remove said data. You might be able to get a language model to reveal something solid that indicates where it got it’s information, but it isn’t simple or easy. And it’s even more difficult with visual works.
There’s an opportunity for the industry to legitimize here by creating a method to manage data within a model but they won’t do it without incentive like millions of dollars in copyright lawsuits.
Delete that comment you just posted from every Lemmy instance it was federated to.
This whole internet thing was a mistake because it can’t be controlled.
And in other parts of the world where it’s just a standard. I was surprised when I saw WhatsApp numbers on advertisements with the WhatsApp logo. Hard not to be on WhatsApp in those places.
Android is probably my biggest privacy hole right now. I’ve considered alternatives but none of them particularly appeal to me. I moved away from Gmail, Google Voice, Chrome/chromium, deleted Facebook, etc… But android has some deep tendrils.
What’s your take on Graphene?
They also don’t want to be sued, so yes, this is the lowest effort way to limit their liability.
Out of curiosity, is it just rights to use or ownership rights? Not saying the former is good, but it’s still better than the latter.
In many cases, its a CYA policy just so they don’t have to ask permission for every single image. Hopefully they’re the respectful type that will either remove or blur the student upon request.
Then what do you use for your password manager?
I’ve always been of the mindset that storing your 2fa next to your passwords at least partially defeats the purpose of 2fa.
The two types of attacks I worry about would be a hacked/leaked password from a third party site, or your password manager being compromised. While the latter is far less likely, it is still something I’d like to protect myself from as much as possible.
Know your school handbook and acceptable use policy inside and out. Same with any other published guidelines they provide. My bet is that their AUP says something about not circumventing their security and monitoring tools. Booting into a live OS would certainly fall into that category. But knowing what the rules actually say is probably the first thing you should do since you don’t own the hardware or network. From there, you can decide how far you really want to go and if there are any defenses or loopholes in the rules.
Getting your own hardware is probably your best option in this case if you can do so.
Keep in mind that basic bots don’t render or process certain page elements - like javascript. So VPN plus noScript/uBlock plus obscured data plus no preexisting cookies and possibly unique fingerprint from all your previous interactions (depending on your privacy settings)… It all adds to possible bot behavior. In my mind, getting caprcha’d is a good thing. It may mean google has low confidence that it knows who I am.
Tell that to anyone running a website with a pubic facing form - including register and login forms.
Probably the closest thing you can get to in terms of a “privacy” credit card. Everything about a credit card is tied to you by their very nature. So it depends on what or who you want privacy from.
Someone else mentioned privacy.com which I also use - it’s good if you want to hide your transaction from the credit card company, or if you want to hide your identity from the merchant. But Privacy.com is more like a virtual debit card that connects to your bank account. Privacy.com still knows who you are.