Sam Clemente
š³ļøāš | Autistic | Developer behind Routines, Just. Weather., and [REDACTED] ;) | Writer for AllThingsTech blog | Occasionally a YouTuber | USBC Shill | OLED enjoyer | Bird denier | Pluto defender | Oxford comma rights activist | Gluten havenāt-er | Intolerant of lactose | Fahrenheit > Celsius (climate only) | Metric preferred (except climate)
@BackOnMyBS Itās been a lot of trial and error mostly, but thatās my general framework, it varies by person, someone who understands autism more is usually a little easier to work with, for example
@BackOnMyBS Itās not entirely straightforward, but I find that stating āIām confused because you said āxā which I interpreted as āyā and this thing youāre saying now I interpret as being āzā doesnāt seem consistent, what am I not understandingā (doesnāt have to be those exact words)
Or if itās something I said I apologize for the confusion, state my intentions behind what I said, and try to say it in a different way based off how they interpreted the last thing I said
@BackOnMyBS I finally figured out how to properly communicate when Iām confused about someoneās behavior or their perception of my behavior, Iāve been able to get more context in conversation as well as avoid certain arguments due to miscommunication/misinterpretation
@thestereobus @Cock_Inspecting_Asexual AirPods Pro 2 really work for me personally
If you wanted to stick with the AirPods route the Maxes will do a better job of noise isolation due to size, but theyāre bulky and super expensive
Though there are rumors going around that Apple will be updating the AirPods Max today at their release event so definitely keep a lookout for those if youāre interested
@TwilightKiddy I can see how you can get there, but the MITM would need to know the hashing algo, you canāt *really* just un-hash something, at least not reliably
But your original statement was that the hashing was the privacy violation, and thatās the part I took issue with, hashing is a generally accepted security measure, it is not inherently a privacy violation
@TwilightKiddy @prousername bro really said hashing is a privacy violation??
@zbyte64 where am I wrong? The process is effectively the same: you get a set of training data (a textbook) and a set of validation data (a test) and voila, Iām trained
To learn how to draw an image of a thing, you look at the thing a lot (training data) and try sketching it out (validation data) until itās right
How the data is acquired is irrelevant, I can pirate the textbook or trespass to find a particular flower, that doesnāt mean Iām learning differently than someone who paid for it
@zbyte64 data quality, again, was out of the scope of what I was talking about originally
Which, again, was that legal precedent would suggest that the *how* is largely irrelevant in copyright cases, theyāre mostly focused on *why* and the *scale of the operation*
Iām not getting sued for copyright infringement by the NYT because I used inspect element to delete content to read behind their paywall, OpenAI is
@zbyte64 from what I understand, youāre referring to the process at scaleāthe amount of information the AI can take in is inhumanāwhich Iām not disagreeing with
None of which is relevant to my original point: the scale of their operations, which has already been used countless times in copyright law
The scale at which they operate and their intention to profit is the basis for their infringement, how theyāre doing it would be largely irrelevant in a copyright case, is my point