• 2 Posts
  • 441 Comments
Joined 3 years ago
cake
Cake day: January 17th, 2022

help-circle


  • No idea what your analogy about non conventional medicine is about. Feel free to explain.

    just be visible to your home network’s ISP instead of your phone’s ISP.

    Indeed, which is already what I mentioned, namely another group. It’s about the threat model namely if you trust one ISP more than another. I believe your understood that but chose not to acknowledge it and I’m not sure why but maybe it related to your analogy that I didn’t get.

    Edit: if you and others are interested in the topic I recommend https://splintercon.net/ plenty of resources on the topic.

    PS: FWIW I didn’t suggest VPN is the solution to all problems but they do alleviate some. The point is one must understand both how they work and their threat model.









  • A good example to “play” with could be https://coveryourtracks.eff.org/ which does highlight the idea of “bits of identifying information” namely :

    “A “bit” is a basic unit of information for computers. The bit represents a logical state with one of two possible values, often represented as “1” or “0”, for example. In your results from Cover Your Tracks, some metrics may be listed as “1” or “0”, or “true” or “false”, indicating whether a setting is enabled or disabled. While each individual metric’s details may seem like a small amount of information, when combined with your browser’s other metrics, they can uniquely identify your browser. Your results are measured in “bits of identifying information,” which is a combined summary of all these metrics.”

    Point being, not all behaviors, conscious or not, explicit or not, lead to the same amount of bits. Some are VERY valuable, others are basically pointless. Knowing the difference means not spending a lot of energy fighting without making a difference.





  • quick test as to if they’re your people or not

    Absolutely… it’s like when during job interview the recruiter ask if you code on the weekend. Some people treat that like the absolute worst question ever. Yes, in most cases I would argue it’s to probe if you can be abused by working over time for free… but maybe you are into that or rather you do have found a way to make it work, e.g. NOT work during some weekdays. The point is that the question itself is a way to discover BOTH ways, for them AND for you. It is perfectly fine to stop right there and then if any of you is now aware that it’s a show stopper because of whatever difference. The entire purpose of dating or interviews is to engage in a more involving relationship ONLY if it’s worth it for both. It’s a discovery phase, not a “let’s close the sale” phase.




  • conjure up an email summary within seconds that can shave off up to 5 whole minutes

    … but can it? Like actually, can one do that?

    Sure an LLM can generate something akin to a summary. It will look like it’s getting some of the points in a different form… but did it get the actual gist of it? Did it skip anything meaningful that once ignore will have far reaching consequences?

    So yes sure an LLM can generate shorter text related to what was said during the meeting but if there is limited confidence in the accuracy and no responsibility, unlike somebody who would take notes and summarize potentially facing negative consequences, then wouldn’t the reliance on such a tool create more risk?