• 0 Posts
  • 824 Comments
Joined 5 months ago
cake
Cake day: February 10th, 2025

help-circle



  • It’s not allowed.

    There’s only one opinion on AI allowed on social media: It’s the worst thing to ever happen and produced by stealing from starving child artists. The ouput is somehow simultaneously the worst quality imaginable with no redeeming qualities and also about to put every creative out of a job by next quarter.

    The fact that you don’t hold this opinion tells everyone what a horrible person that you are for not knowing the right opinion to have.

    Enjoy being downvoted out of the conversation between tech illiterate children who believe everything they’re told and tech illiterate creatives who haven’t found a hyperbole that they cannot employ in their Luddite quest to stop advanced linear algebra













  • The problem with trying to increase the signal to noise ratio is that you don’t know all of the datapoints that are being collected and some of those datapoints could be used to filter the real from the fake.

    Like, in your example, if you made all of these account from the same browser then they could be linked together. If they were made on the same IP, they could be linked together. If you were using the same phone, they could be linked together. Those are just the datapoints that we know to try to protect, it’s the datapoints that you don’t know that get you.

    Like, maybe your phone or desktop is screenshotting itself every 5 seconds (“for AI purposes”) or maybe the app that you’re trying to fool also secretly sends your GPS location during account creation or maybe the adversary has malware running on your PC which is keylogging you.

    IF you knew all of the ways that they were collecting data on you, then you could take countermeasures. Since you don’t, you have to assume that any of your identities can be linked to your person unless you take unusual measures such, not using Microsoft/Google/Meta/Amazon/etc products at a minimum. Depending on your security needs this could also mean things like using burner hardware, non-commercial VPNs, physically disabling sensors/radios/ports, traffic/network monitoring, etc.