• 2 Posts
  • 26 Comments
Joined 3 months ago
cake
Cake day: July 26th, 2024

help-circle


  • This is a double-whammy PR nightmare.

    Are we going to do what happened with Jack in the Box in the naughts and start associating E Coli with McDonalds? I remember hearing that FUD so much back then and now that the shoe is on the other foot, I wonder what will happen. 🤔 Not to engage in the fast food wars or anything, but also fuck McDonalds for helping this fat ass at all.


  • Calling the Scarlett Johansson lawsuit “Manufactured Drama” is certainly a take. A bad one, that is.

    Just like the lifting of a famous actress voice, one has to wonder how much LLMs are siphoning the intellectual property of the little-people of the open source world and willfully tossing the license and attribution clauses down the toilet. If they were willing to do it to a multi-million dollar actress, what makes people think that the intellectual property theft doesn’t go much further?

    Anyway, I think for this reason it’s actually really important to note that Junior Devs are much less likely to cause this type of issue for large companies. The question is whether the lawsuits from improper licensing cost more to settle than it costs to hire Junior devs, which brings us roughly to where the international outsourcing phenomenon brought us. At least, IMO.


  • Would love for you to describe exactly how it’s more complicated.

    “More” is relative, ofc, so YMMV on whether you agree with me or not on this.

    But the problem with pass key is that it has all of the downsides of 2FA still – you need to use a mobile device such as a cell phone, that cell phone must be connected to the internet and you often can’t register a single account to multiple devices (as in, there’s only ever 1 device that has passkey authorization.)

    This isn’t an issue with ssh keys, which is a superior design despite it not being native to the web browsing experience. SSH keys can be added or removed to an account for any number of devices as long as you have some kind of login access. You can generally use SSH keys on any device regardless of network connection. There’s no security flaws to SSH keys because the public key is all that is held by 3rd parties, and it’s up to the user in question to ensure they keep good control over their keys.

    Keys can be assigned to a password and don’t require you to use biometrics as the only authentication system.

    I feel like there’s probably more here, but all of this adds up to a more complicated experience IMO. But again, it’s all relative. If you only ever use password + 2fa, I will give them that it’s simpler than this (even though, from the backend side of things, it’s MUCH more complicated from what I hear.)








  • I’m not sure social media is good for anyone, but I understand that “for the kids” is really the only way people feel confident in regulating anything. But it’s all very condescending when the real issue is that social media is causing society to become worse due to Skinner’s Box style human impulses – I do a thing, that gets me attention, so I’ll keep doing it regardless of if it’s right or wrong.

    We shouldn’t blame social media as a blanket villain, but simply request that all web services have transparent suggestion algorithms (preferably open source) and provide tax incentives for companies that help promote verified educational content over made up bullshit (as it’s the only way to get companies to do the right thing, unfortunately)











  • This is a false equivalency.

    Google used to act as a directory for the internet along with other web search services. In court, they argued that the content they scrapped wasn’t easily accessible through the searches alone and had statistical proof that the search engine was helping bring people to more websites, not preventing them from going. At the time, they were right. This was the “good” era of Google, a different time period and company entirely.

    Since then, Google has parsed even more data, made that data easily available in the google search results pages directly (avoiding link click-throughs), increased the number of services they provide to the degree that they have a conflict of interest on the data they collect and a vested interest in keeping people “on google” and off the other parts of the web, and participated in the same bullshit policies that OpenAI started with their Gemini project. Whatever win they had in the 2000s against book publishers, it could be argued that the rights they were “afforded” back in those days were contingent on them being good-faith participants and not competitors. OpenAI and “summary” models that fail to reference sources with direct links, make hugely inaccurate statements, and generate “infinite content” by mashing together letters in the worlds most complicated markov chain fit in this category.

    It turns out, if you’re afforded the rights to something on a technicality, it’s actually pretty dumb to become brazen and assume that you can push these rights to the breaking point.