• 0 Posts
  • 23 Comments
Joined 6 months ago
cake
Cake day: October 3rd, 2025

help-circle

  • By that logic, AI engineers can just say they’re an archive and steal IP from artists to “lend” it to their LLM? I’m not saying the dude was in the right, I’m saying calling yourself an archive doesn’t automatically make you immune to IP challenges. When IA started “controlled digital lending” shortly after the pandemic, they started taking fire from creators.

    An archive archives things. It’s not a library, it’s not a tor host, and CDL shouldn’t have happened… but everyone was on lockdown.







  • You can’t tell by the giant frames that never fit anyone’s face and the giant circular cameras with a recording indicator? Even if you disable the indicator, I would just assume they are always recording.

    Same thing came up in the 90’s with pinhole cameras. Jackass used them and they all looked like narcs.

    The number of cameras you’re on every day, being surveillance by government agencies/affiliates, should be this academic’s priority. Not the AmericanTurk doing food reviews.

    Ok. Let’s say this app does find the glasses, then what? More Karen’s that don’t understand what “reasonable expectation of privacy” means?











  • I guess I don’t understand the metric of success. My training at work has helped me recognize risks more than most of my family that has no idea what root domain URL scam is. Did most of my family fail? Yes. Did 20% learn something and avoid risk? Yes.

    In large companies the training is for liability purposes, “see they all passed their tests, we tried to warn them”. People are always going to be the attack vector, that’s unavoidable… but 20% success is better than 0% success. As an admin, if I received a 20% spike in phishing reports, that’s statistically significant and should be looked into and stopped (proxy violation).

    Cost of training is unavoidable and budgeted for.



  • I’m speaking from the point of view of the app you gave permissions to collect your hardware data. Y’all are talking like I think a MAC is transmitted over tcp. I don’t need an intro to OSI. Those apps use the hardware data to know if you’re using Samsung, LG, Apple, etc and they store large databases of MAC addresses on individuals. They can even build a local hardware profile to see if you sold your device, to whom, and what device you replaced it with.