Truely a nice one. The community around it is quite cool as well.
Truely a nice one. The community around it is quite cool as well.
Or make sure you can hook it to something like home assistant without reliance on cloud…
Your examples are clear indication that you know jack shit about actual police work. Admittedly in civilised countries where there are checks and due process. Cops aren’t getting access freely to comms. A magistrate can depending on circumstances. And there’s plenty of red tape everywhere. Even telco operators will refuse to respond to a request if not absolutely justified. And typically that’s not when timmy sold some shit to his neighbour. Organised crime, murders, rapts… instances of those with actual victims are not threats, they are shits that happen and needs to be sorted.
Lemme be the judge of that… grow a bit and put your argument on the table.
Don’t hesitate to develop…
Call interception, retro and all methods of investigation relying on télécommunications are, and need to remain, a tool available for police forces when the crimes they are investigating are greatly impacting society. Having a prosecutor request those within acceptable limits is a net positive. Not the same as having dragnets spying on everyone in the hope of hitting keywords mind.
But criminality is using more and more complex tools at their disposition and there’s just no way of policing like in medieval times anymore.
OK
They are active in whistleblowing, not privacy leak management…
Nha they publish metadata describing the leaked data. If you’re a data subject concerned by the incident you then request a copy of yr information which requires proper identification.
Why would they share the data itself….
At this point they are somewhat catching up on what traditional banks are doing it seems…
Typically llm are rather ressource intensive - you need beefy hardware to run those at speed. Especially if you intend to train them with your data to improve their relevance. I don’t think mobile phones or run to the mill laptops are going to be enough for any non-trivial implementations. I might be skewed by experiences on non-personal projects though.
How do you anonymise without supervision ? And obfuscation isn’t anonymisation…
They could try to pass it as a legitimate interest but likely it would be struck as being ultimately disfavouring the individual and favouring the business. Probably.
Well then explain me how you propose to apply data subject rights to a llm… you can’t currently un-train those as far as I know. And that’s not touching IP which isn’t exactly the same here and there.
I’m professionally watching what’s happening with this very topic and the current state of the law and related decisions makes everyone in the business cautious at the very least. Doesn’t prevent business to take risks but it’s risk taking indeed.
Yeah that’s not standing in europe… especially for PII…
Yeaaahhh pretty sure my wife still cuts my balls if I resort to that…
Isn’t Japan famous for sexual services used by married man? And isn’t it pretty much accepted ?
What I don’t get is what’s the end game? Because this will likely affect only already law abiding citizens or those with limited technical knowledge as bad agents will simply generate certificates and encrypt however they see fit. It’s not like building an encrypted client is hard…
I can relate to the guy that had to put that number in. Prolly went along the lines of « can we get some budget to identify our various processing activities and what processors are involved ? »… to what management said « lol no just put the overall numbers in ». And the guy included the kitchen company in there because fuck it.
We tend to forget that all of that is to support people. Tech shouldn’t be an end goal, merely one of the ways to achieve it. And not always the best one at that.