Skip Navigation

Posts
6
Comments
122
Joined
4 mo. ago

  • Eh, recent studies show some implicit bias in some of the best Chinese models, mostly when it comes to software dev stuff so less relevant here. Not the hugest deal for this kind of projected either way, but it would be good to know if they are using those vs say Llama, or yes just building a front end fine tune for a closed model.

  • In my dumb naive optimistic brain bridges are the perfect kind of software to be automatically developed, revised, tested, and updated by AI agents.

    Two sets of rules with written documentation (API), translate request from one to the other, validate message sent and message received, if not revise and test again.

    Realistically, I know this would likely hit a brick wall quickly, but it sure seems like if AI driven software development is getting actually practical this type of thing should be on the easier end of the spectrum of possibilities.

  • I notice it doesnt say what model Socialism AI is built on top of, I'm guessing one of the Chinese models fine tuned?

  • ISPs should be regional users cooperatives everywhere. Rural areas in the US have local ISPs structured this way, but corporate ISPs have been trying to use regulation to make them illegal in normal service areas, which is disgusting.

    I predict that point to point private fiber (currently used by high speed traders) will become more and more prevalent as issues with AI impersonation and spoofing become more prevalent, we should use this infrastructure drive to push linking co-op and public mesh networks using the same long-run conduit.

  • Nice! Thanks for posting this. Does it run on all wifi bands? Is there provision for mesh extension by wired Intranet?

  • Thanks

  • You can run it yourself on a closed network if you're worried about telemetry, that's part of the point.

  • is this with or without the prompt including politically sensitive topics?

  • Prohibition leads to the propagation of means of evasion. By attempting to ban teenagers from popular means of communications they will incentivize mass adoption of "illicit means" of communications, and create another generation both familiar and comfortable with "illegal online activity" like the Napster generation. Just like Napster, this will also accidentally push youth into online platforms and channels where they are more likely to encounter content not suitable for minors and malware.

    The only "truly effective" form that this type of internet control can take is requiring a digital ID verification to establish a connection to the network at the ISP, and that is a nightmare setup we should be prepared to fight tooth and nail.

  • I have suggested a couple of times now that ActivityPub should implement an encryption layer for user authentication of requests and pings. It already has a system for instances vauching for each other. The situation is that users of "walled garden" instances in ActivityPub lack means of interfacing with public facing instances that doesnt leave the network open for scraping. I believe a pivot towards default registered users only content service built on encrypted handshakes, with the ability for servers to opt-in to serving content to unregistered users would make the whole network much more robust and less dependent on third party contingencies like CloudFlare.

    Then again, maybe I should just be looking for a different network, I'm sure there are services in the blockchain/cryptosphere that take that approach, I just would rather participate in a network built on commons rather than financialization at it's core. Where is the protocol doing both hardened network and distributed volunteer instances?

  • How is Gemini fairing in the existing bot landscape? Usenet?

  • Damn, how was this not big headline news?

  • And of course in Cyberpunk the ttrpg setting much of the o0en internet was rendered useless by self replicating AI malware hijacking storage, processing, and bandwidth due to a zero day exploit discovered by one egomaniacal hacker.

  • corn me up snake, I'm passing through your bountious fields shortly

  • Deleted

    Permanently Deleted

    Jump
  • Yes, the idea of the physical ID card they discuss makes a lot of sense, however that has the problem of associating your device with your ID.

    When it gets to cloud hosting the personal data and an intermediary validation service that's where I get even more skeptical.

    I have a vague idea about a system that uses a time and topology based encryption where a person's private information is encrypted and can generate a public key pair that will only match within a set time frame so that the data is held on government servers fully encrypted and when the user issues a "consent" that consent enables validation of a check-sum when both the user and the website provide the public keys without directly querying the government database. So basically the website is issued a public key by the server that works for all citizens that are above an age limit, and the users are sent private keys from their government data store whenever new data is encrypted. If the user's age is above the limit, the user's key will validate the age check, and because the key changes rapidly over time it cant be used to correlate the individual across multiple validation checks.

    Users can host a version of the data store locally, that can be validated as matching the government store using the query "is there a match to the shape of this encrypted data" rather than querying a specific citizen info store (this is blockchain tech, but can be centralized). This could be used to fight against identity theft, which is certain to be a crime that spikes with any digital ID system. Thats not the most clear but I think you'll get the gist, no intermediaries necessary.

    All this said, in the US there are private services that validate physical ID cards using the codes on the back or a scan of a photo of the ID, so clearly the information has already been made available to private industry from the government through some channel. So that might be even worse than proposed systems in other nations already, I dont know.

  • Deleted

    Permanently Deleted

    Jump
  • A pretty good system, the crucial implementation being a robust consent management system for data access, and Metadata tracking to make sure the account identifier isn't being used behind the scenes as a de-facto tracker by the public sector.

    To me the risk of Digital ID is two fold, one it gives the government a centralized means of tracking individual behavior and thereby crushing dissent (from a Social Credit System, to straight up Russian style gulagging the opposition). On the flip side it gives private sector actors a central immutable identifiers to associate behavior with that can't be erased by deleting or abandoning an account.

    Age Verification is the point where these two concerns are merging into one. Abolishing online anonymity is tantamount to universal surveillance by both the state and private actors, setting up a system of automated persecution tyrants have dreamed of for ages but hasn't been possible until today with Machine Learning making mass data processing automation both viable and feasible.

    Fascist population control and the "final solution" weren't possible in the way they were implemented until IBM sold the Germans early tabulating machines / computers. ML is the next phase of that same arc of development.

    Use of Digital ID to log internet activity is what makes individual data streams continuous, contiguous, and compileable by default.

    The consequences are clear, the question is what we can do to prevent it from happening.

  • Deleted

    Permanently Deleted

    Jump
  • This is the biggest struggle of the decade at least. It needs to be forced on every politician as an issue to make statements on. No votes for Digital ID supporters.

  • What are the implications for users of FOSS? Should we not be downloading from github?

  • Links in the article. Hugging Face and Swiss Telecoms host