Salamander

  • 4 Posts
  • 30 Comments
Joined 3 years ago
cake
Cake day: December 19th, 2021

help-circle
  • I did not know of the term “open washing” before reading this article. Unfortunately it does seem like the pending EU legislation on AI has created a strong incentive for companies to do their best to dilute the term and benefit from the regulations.

    There are some paragraphs in the article that illustrate the point nicely:

    In 2024, the AI landscape will be shaken up by the EU’s AI Act, the world’s first comprehensive AI law, with a projected impact on science and society comparable to GDPR. Fostering open source driven innovation is one of the aims of this legislation. This means it will be putting legal weight on the term “open source”, creating only stronger incentives for lobbying operations driven by corporate interests to water down its definition.

    […] Under the latest version of the Act, providers of AI models “under a free and open licence” are exempted from the requirement to “draw up and keep up-to-date the technical documentation of the model, including its training and testing process and the results of its evaluation, which shall contain, at a minimum, the elements set out in Annex IXa” (Article 52c:1a). Instead, they would face a much vaguer requirement to “draw up and make publicly available a sufficiently detailed summary about the content used for training of the general-purpose AI model according to a template provided by the AI Office” (Article 52c:1d).

    If this exemption or one like it stays in place, it will have two important effects: (i) attaining open source status becomes highly attractive to any generative AI provider, as it provides a way to escape some of the most onerous requirements of technical documentation and the attendant scientific and legal scrutiny; (ii) an as-yet unspecified template (and the AI Office managing it) will become the focus of intense lobbying efforts from multiple stakeholders (e.g., [12]). Figuring out what constitutes a “sufficiently detailed summary” will literally become a million dollar question.

    Thank you for pointing out Grayjay, I had not heard of it. I will look into it.









  • Almost all countries require official authentication to activate a SIM card.

    Fortunately not in the Netherlands. I don’t think that’s the case in the rest of the EU. I can use free sim cards as much as I want!

    When communicating with cell towers, a phone will also broadcast its unique IMEI identifier. So, even if you swap the SIM card every day, your IMEI is still being broadcast the same.

    Changing the IMEI of a phone in the EU is illegal, unless the manufacturer consents: https://www.legislation.gov.uk/ukpga/2002/31/section/1

    So… I have a Chinese 4G mobile router, and the manufacturer gives me the permission to change the IMEI as it is an integrated feature of the device. I use that for my data. The data codes I purchase small quantities in bulk with cash, and I can access the router via its ip from my phone’s browser to send the SMS messages to activate the data codes as needed. Since WiFi connections are abundant around here I keep these codes for emergencies. I can go a few months some time without activating data codes. I mostly use them when traveling internationally.



  • I ordered four of the simpler devices this weekend (LilyGO T3-S3 LoRa 868MHz - SX1262) and I have been reading about antennas.

    Since I live in a city I am not super optimistic about the range. But I am still very curious about the concept, and I would love to be surprised.

    After doing some search about antennas, I have decided to test the following combination:

    I also have a vector network analyzer (LiteVNA) that can be used for checking antennas, so I will also try to build some antennas myself. I doubt that my custom antennas will approach the performance of the professional ones… But I just find it such a cool concept.

    Have you already gotten to play with it? What is your experience so far?


  • Salamander@mander.xyztoTechnology@lemmy.mlShould AI images be copyrightable?
    link
    fedilink
    arrow-up
    3
    arrow-down
    2
    ·
    edit-2
    11 months ago

    Sure.

    If I make my own AI image generator and create a nice image with it, or use some AI engine that gives me full ownership of the output, I can choose to share it online with whatever license I want to share it with. I don’t see why the regular copyright rules for digital images and photographs would not hold… If someone shares their AI creation online and wants others to share with attribution, or not share at all, what is wrong with that?

    I can take a ton of photos of objects with my phone, upload them to Flickr, and they are all copyrighted. That doesn’t mean that other’s can simply take similar photos if they wish to do so. The same with AI. One can decide whether to share with attribution, pay someone to let them use it, or to generate the image themselves using AI. It does not seem like a problem to me.



  • Thank you - that makes sense!

    I think I understand why this is done now. Most HTTP requests are hidden by the SSL encryption, and the keys to decrypt it are client-specific. So, if one wants to block ads at the network level without needing to get the SSL keys of every client that connects to the network, then this is the most specific amount of information that you can provide the PiHole with. The HTTP blocking needs to be set up in a client-specific manner, and that’s why they work well as browser extensions.


  • Thanks!

    Adblocking plugins aren’t limited by this and can filter the actual content and HTTP requests made by the browser.

    Why is this the case? What rules do Adblock plugins use that allow them to determine that something that is being served is an ad? I understand from what you are saying that Adblock will block on the basis of the HTTP requests instead of filtering at the DNS level - do ads come with specific HTTP headers that are not processed by the pi-hole DNS server and thus can’t be used for filtering? I don’t fully understand yet the details of how the two ad-blocking mechanisms operate, so their differences are not obvious to me.





  • I would kill. 2X growth rate is too fast, and it is easily better 100 random people now than 200 immediately after.

    What about these rules?

    • The group of people in the tracks is randomized every time.

    • The group always includes the person that the current decision maker loves the most.

    • The choice is to kill, or to increase the number of people in the kill group by one.

    • If the number of humans available reaches the population number, everyone dies.

    • The list of every decision made by every decision maker is public knowledge.

    • You are the first decision maker.


  • EDIT: Sorry, I misunderstood this question ~~ I have a raspberry pi connected to a 1 TB SSD. This has the following cron job:

    00 8 * * * /usr/bin/bash /home/user/backup/backup.sh

    And the command in backup.sh is:

    rsync --bwlimit=3200 -avHe ssh user@instance-ip:/var/www/mander/volumes /home/user/backup/$(date | awk '{print $3"-" $2 "-"$6}')

    In my case, my home network has a download speed of 1 Gbps, and the server has an upload speed of 50 Mbps, so I use -bwlimit=3200 to limit the download to 25.6 Mbps, and prevent over-loading my server’s bandwidth.

    So every morning at 8 am the command is run and a full backup copy is created.

    It seems that you have a different problem than me. In your case, rather than doing a full copy like me, you can do incremental backups. The incremental backup is done by using rsync to synchronize the same folder - so, instead of the variable folder name $(date | awk ‘{print $3"-" $2 “-”$6}’), you can simply call that instance_backup. You can copy the folder locally after syncronizing if you would like to keep a record of backups over a period of a few days.

    On a second thought, I would also benefit from doing incremental backups and making the copies locally after synchronizing… ~~


  • You can create a one-person instance and hold your identity there.

    If you what you want is for every server to hold your identity, you have to trust all servers. I think that an evil admin would be able to impersonate any user from any instance if that were the case. How do you delete your account? Can an any admin delete your account everywhere? Which one is the real “you”?