notfromhere

joined 2 years ago
[–] notfromhere@lemmy.ml -4 points 1 year ago (7 children)

We need AI systems that do exactly as they are told. A Terminator or Matrix situation will likely only arise from making AI systems that refuse to do ad they are told. Once the systems are built out and do as they are told, they are essentially a tool like a hammer or a gun, and any malicious thing done is done by a human and existing laws apply. We don’t need to complicate this.

[–] notfromhere@lemmy.ml 2 points 1 year ago

Don’t upvote bad information, people.

[–] notfromhere@lemmy.ml 1 points 1 year ago (1 children)

I am not a lawyer so can’t comment on the reverse engineered code counting as derivative. Personally, I thought it would be considered that. The time doesn’t mean much considering Yuzu.

Yuzu | Initial release | January 14, 2018; 6 years ago |

[–] notfromhere@lemmy.ml 4 points 1 year ago (2 children)

Firefox is more like Chrome’s little sibling, tagging along and going to all the same places. I wish it would grow up and decide for itself where to go and how to get there. I’m hopeful with the Manifest V3 resistance that this is changing.

[–] notfromhere@lemmy.ml 2 points 1 year ago (3 children)

Why is that, isn’t it technically a derivative work?

[–] notfromhere@lemmy.ml 1 points 1 year ago* (last edited 1 year ago) (5 children)

Cue Nintendo’s DMCA takedown in 3…

[–] notfromhere@lemmy.ml 4 points 1 year ago

At that point just set a break-glass root password and don’t use sudo or doas.

[–] notfromhere@lemmy.ml 4 points 1 year ago* (last edited 1 year ago) (1 children)
  • Pandorum
  • eXistenZ
  • Avalon
  • Sin City
  • Sleepers
  • V for Vendetta
  • Sleepy Hollow
  • Spawn
  • Pi
  • The Ninth Gate
  • Saw
  • The Machinist
  • Alien (1979)
  • Road to Perdition
  • The Salton Sea
  • Secret Window
  • The Crow
[–] notfromhere@lemmy.ml 1 points 1 year ago

Is there a wiki list of the “good ones?”

[–] notfromhere@lemmy.ml 25 points 1 year ago (2 children)

Epstein didn’t kill himself and he’s still alive and the body is from a lookalike they killed to fake his death. Is that good enough conspiracy theory?

[–] notfromhere@lemmy.ml 1 points 1 year ago (1 children)

I looked into it but I felt at the time it was too complex, maybe I’ll look at it again. Currently I am using wireguard for all cluster node-to-node traffic. It seemed like a reasonable tradeoff at the time, but it is at the network layer instead of application, so I really should revisit that at some point.

view more: ‹ prev next ›