• 8 Posts
  • 147 Comments
Joined 1 year ago
cake
Cake day: July 23rd, 2023

help-circle

  • I would take what ChatGPT tells you with a gigantic salt crystal.

    Case in point: I made a fairly important purchase in a foreign country recently. The seller’s countract was in the local language, which I speak for ordinary matters but not well enough to understand legalese.

    The seller couldn’t find how a crucial piece of the contract was translated into English, so she typed “Say this in English: the buyer has no right to pull out of the deal even in case of force majeure” in her language. ChatGPT translated it as “The buyer has the right to pull out of the deal in case of force majeure” in English. The exact opposite of what was written!

    Luckily for me, while I didn’t know the legal terms in the local language, I could see it was a negative sentence. So I managed to catch it and understand that the clause was in fact working against me-the-buyer, not in my favor.

    I know why ChatGPT translated it that way: the force majeure clause in most contracts usually states that the deal is off in case of force majeure (force majeure usually being a euphemism for death). But in this instance, the seller turned the clause 180 degrees around, leaving my children on the hook if I snuffed it early and didn’t complete the payment. ChatGPT, being nothing more than a mechanical parrot, simply repeated the most common form of force majeure clause it had been trained on.

    The main takeway from this story is: you should never trust what ChatGPT says, and the more important what you ask it to tell you is to you, the more consequences you will suffer for its mistakes.










  • The TOR network itself is safe - at least assuming the TLAs don’t control at least half of the nodes, which is far from impossible. But let’s assume…

    The weak point comes from the browser: that’s how the fuzz deanonymizes users. The only safe browser to use on TOR is the TOR browser, and that’s the problem: it disables so many unsafe functionalities that it’s essentially unusable on a lot of websites. So people use regular browsers over TOR, the browser leaks identifying data and that’s how they get caught.


  • Here’s a little story that shows how much society has become dystopian:

    Back in the 90’s, I worked in France for a while. When I was there, a case was brought up against the state that had violated a CNIL rule: some dude was cheating on his taxes by claiming he lived at some address. Tthe French fiscal administration sued him because they obtained a file from the electricity company and another from the water utilty company showing that the consumption of both electricity and water were so low it wasn’t consistent with the dude actually living there.

    The case was thrown out, the dude walked and the state was fined because it had violated a rule that clearly stipulated cross-referencing files for the purpose of extracting secondary information that wasn’t available in each single file was a violation of privacy and civil liberties.

    I shit you not. This used to be a thing.

    Can you imagine this today? All the Big Data sonsabitches cross-reference billions of files ALL THE TIME and nobody bats an eyelid anymore.

    If you’re old enough, you remember sovereign states taking privacy seriously. If you’re not, you don’t. And that’s how Big Data gets away with what they do today because fewer and fewer people remember a time when it was unacceptable.









  • It’s not the only thing that leaks timezone data, and the fix is identical: have the machine pretend you’re in UTC.

    For example: if you enable Resist Fingerprinting (RFP) in Librewolf, it will lie to websites and pretend your timezone is UTC - because of course timezone is one of the factors used to fingerprint you - and all the sites you visit that show you your local time, or depend on your local time for something or other, will show you the wrong time. And that’s how you know it works 🙂