And Hotmail deleted all my emails after not signing in for some period, twice. Then, I just stick with gmail since the early days until now.
And Hotmail deleted all my emails after not signing in for some period, twice. Then, I just stick with gmail since the early days until now.
Bill Gates during the early years, yes. But now, I thought he’s turned 180°.
I expect that for posts but not for votes. Inherently, we don’t want our votes to be public - that kind of defeat the purpose.
Lemmy is already a privacy nightmare, in some way. There was a comment showing the screengrab of those peiple who upvoted and downvoted a post. Basically, if you self-host an instance, you’ll have access to these. This can easily be weaponized by certain organizations that want to create profiling of lemmy users, e.g NSA and Intelligence agencies.
yes, I am one of those who are also getting bored of it. But this doesn’t mean that I am part of the market that they targeted. They might me targeting certain segments or even service providers such as game developers or console makers etc. The technology is still in it advent stage so it is too early to say wether they are going to fail.
Sorry, I disagree with this kind of generalisation. To be rational, Just because you don’t want it, it doesn’t mean everyone else is on the same ship. I am very sure there are certain people who will benefit from this and want it.
I use encfs and sync it to dropbox etc. Then use gopass password manager to store password in the encfs folders. Not fully auto-integrated but good enough for me.
Very unlikely, If you read and refer to the article. The identity was stolen but the pic is a stock photo.
The two images at the top of this story are a stock photo and what KnowBe4 says is the AI fake based on the stock photo.
Just stop using YT altogether.
They should but easy to say than done. In the end they will return back to it if no better or at least equal alternatives are out there to fill the vacuum.
the methods used by thiefs to try and get access to your phone data.
It is not about accessing the data but to disassociate the current user from the phone so that the thief can reset the phone or/and it’s components for new users.
no matter our computational techniques, the diminishing returns in predictive precision is reached far sooner than we achieve general intelligence
That’s very bold presumption. How can they be so sure of this, that any future models can’t tackle the issue? have they got proof or something.
Something to consider but not for anyone: if youre thinking of using latex, why don’t just learn how to use raw latex packages. Download the packages and use your own editor and PDF viewer. It you’re using Linux, maybe something like [(neo)vim+vimtex]+zathura. Anyway you can still use LyX to easily create math formula by copy pasting. And for backup, you can use github (plus Dropbox) etc.
I have all except one: Decentraleyes instead of Privacy Badger, for no specific reasons.
you don’t understand, do you? This kind of post is out of place, has ‘attention seeker’ vibe - those that we rarely come across on Lemmy but usually found on Facebook.
Hey, I follow up your suggestion - come back and read the article. No doubt, a very engaging read. Thx.
thx.
thx.
anyone can tldr?
this is better posted at Facebook.
You can get more context from the comments at Hacker News. Below is taken from from one of the comment:
Translated by ChatGPT.
Summary:
10/18:
Translation of the provided text:
Title: Urgent Warning
The “reputation washing” behavior of Tian Keyu has been extremely harmful
For the past two months, Tian Keyu has maliciously attacked the cluster code, causing significant harm to nearly 30 employees of various levels, wasting nearly a quarter’s worth of work by his colleagues. All records and audits clearly confirm these undeniable facts:
Modified the PyTorch source code of the cluster, including random seeds, optimizers, and data loaders.
Randomly killed multi-machine experiment processes, causing significant experiment delays.
Opened login backdoors through checkpoints, automatically initiating random process terminations.
Participated in daily troubleshooting meetings for cluster faults, continuing to modify attack codes based on colleagues’ troubleshooting ideas.
Altered colleagues’ model weights, rendering experimental results unreproducible.
It’s unimaginable how Tian Keyu could continue his attacks with such malice, seeing colleagues’ experiments inexplicably interrupted or fail, after hearing their debugging strategies and specifically modifying the attack codes in response, and witnessing colleagues working overnight with no progress. After being dismissed by the company, he received no penalties from the school or advisors and even began to whitewash his actions on various social media platforms. Is this the school and advisors’ tolerance of Tian Keyu’s behavior? We expect this evidence disclosure to attract the attention of relevant parties and for definitive penalties to be imposed on Tian Keyu, reflecting the social responsibility of higher education institutions to educate and nurture.
We cannot allow someone who has committed such serious offenses to continue evading justice, even beginning to distort facts and whitewash his wrongdoing! Therefore, we decide to stand on behalf of all justice advocates and reveal the evidence of Tian Keyu’s malicious cluster attack!
Tian Keyu, if you deny any part of these malicious attack behaviors, or think the content here smears you, please present credible evidence! We are willing to disclose more evidence as the situation develops, along with your shameless ongoing attempts to whitewash. We guarantee the authenticity and accuracy of all evidence and are legally responsible for the content of the evidence. If necessary, we are willing to disclose our identities and confront Tian Keyu face-to-face.
Thanks to those justice advocates, you do not need to apologize; you are heroes who dare to speak out.
Link to the inquiry recording of Tian Keyu: https://www.youtube.com/watch?v=nEYbYW--qN8
Personal homepage of Tian Keyu: https://scholar.google.com/citations?user=6FdkbygAAAAJ&hl=en
GitHub homepage of Tian Keyu: https://github.com/keyu-tian
10/19:
Clarification Regarding the “Intern Sabotaging Large Model Training” Incident
Recently, some media reported that “ByteDance’s large model training was attacked by an intern.” After internal verification by the company, it was confirmed that an intern from the commercial technology team committed a serious disciplinary violation and has been dismissed. However, the related reports also contain some exaggerations and inaccuracies, which are clarified as follows:
The intern involved maliciously interfered with the model training tasks of the commercial technology team’s research project, but this did not affect the official commercial projects or online operations, nor did it involve ByteDance’s large model or other businesses.
Rumors on the internet about “involving over 8,000 cards and losses of millions of dollars” are greatly exaggerated.
Upon verification, it was confirmed that the individual in question had been interning in the commercial technology team, and had no experience interning at AI Lab. Their social media bio and some media reports are incorrect.
The intern was dismissed by the company in August. The company has also reported their behavior to the industry alliance and the school they attend, leaving further actions to be handled by the school.