Syncthing still supports Android, you can download the app via Fdroid.
I’m just a simple man, trying to make his way in the universe.
Syncthing still supports Android, you can download the app via Fdroid.
Tesla’s NACS charging standard is now the charging standard for most car companies operating in the USA.
A midrange graphics card and 16 GB of RAM should suffice. Check their site for specifics.
You don’t need CUDA, it’s actually pretty easy. You can run the Mistral 7B model this add-on is based on using GPT4All. It doesn’t require much, if any, technical knowledge.
Fr, this one is great
I voted for him. Sad to see him leave. It doesn’t seem like we have many advocates for digital privacy in the parliament.
e: typo
Not quite…
The government’s damages expert calculated damages that were “much higher” than the amount cited by Google, the US filing said. In last week’s filing, the higher damages amount sought by the government was redacted.
Then we’ll all get cheaper GPUs! Oh no!
Where is this freely available multimodal GPT4 you speak of?
Nvidia and other chipmakers produce actual, useful products. They’ll be sitting pretty after the bubble pops.
The relevant points outlined in “Recommendations from the High-Level Group on Access to Data for Effective Law Enforcement”:
- Implementing lawful access by design in all relevant technologies in line with the needs expressed by law enforcement, ensuring at the same time strong security and cybersecurity and providing for the full respect of legal obligations on lawful access. According to the HLG, law enforcement authorities should contribute to the definition of requirements, but it should not be their role to impose specific solutions on companies so that they can provide lawful access to data for criminal investigative purposes without compromising security. To that end, experts recommend developing a technology roadmap that brings together technology, cybersecurity, privacy, standardisation and security experts and ensures adequate coordination e.g. potentially through a permanent structure.
- Ensuring that possible new obligations, a new legal instrument and/or standards do not lead, directly or indirectly, to obligations for the providers to weaken the security of communications by generally undermining or weakening E2EE. Therefore, potential new rules on access to data in clear would need to undergo a cautious assessment based on stateof-the-art technological solutions (which should in turn consider the challenges of encryption). When ensuring the possibility of lawful access by design as provided by law, manufacturers or service providers should do so in a way that it has no negative impact on the security posture of their hardware or software architectures.
- Enhancing EU coordination and support to address situations where technical solutions exist to enable lawful interception but are not implemented by providers of Electronic Communications Services. In such cases, for example when home-routing agreements or when specific implementation of Rich Communication System (RCS) do not allow lawful interception capabilities, clear guidance and a dialogue facilitated at EU level would improve the cooperation with Electronic Communications Services.
- Conducting a comprehensive mapping of the current legislation in Member States to detail the legal responsibilities of digital hardware and software manufacturers to comply with data requests from law enforcement. It would also take into account specific scenarios and requirements that compel companies to access devices, in compliance also with CJEU caselaw and case law of the European Court of Human Rights. The goal should be to develop an EU-level handbook on that basis, and depending on the aforementioned mapping, to promote the approximation of legislation within this area, and to develop binding industry standards for devices brought to market in the EU, to integrate lawful access.
- Establishing a research group to assess the technical feasibility of built-in lawful access obligations (including for accessing encrypted data) for digital devices, while maintaining and without compromising the security of devices and the privacy of information for all users as well as without weakening or undermining the security of communications.
What does crappy AI art spam have to do with elon? Lol
That’d be funnier if the process didn’t leave that tissue with irreparable scars.
Most of this stuff works with compatibility programs like wine if you really need a windows app
It’s the reality for many developers today.
As long as the users are there and active, it’s a social media platform, too.
It’s got a pretty large and active userbase though. I’d call that social media.
Meh, that one is cheap enough and has a passable update cycle, I’d say it can stay relevant.
Don’t you want the best tool for the job?