Either phishing (send fake link, get you to enter password), or someone messing with you by signing up with your email
Either phishing (send fake link, get you to enter password), or someone messing with you by signing up with your email
I guess you could look at governmental budget or number of employees, but raw size is quite a bad metric for overreach. The knowledge that one year a lot of money was spent inforcing laws tells you very little about the effects that has on the population as a whole.
To do that you’d need a good definition of what exactly overreach is, and you’d probably have to do a lot of work because I doubt anyone else had the exactl same definition.
I mostly see tankies as an authoritarian (far right?) group pretending to be far left. Or at least that’s how they brand it, even though they openly advocate for government confiscation of all property.
All the tankie (far “left”) shit. It’s all either bad faith arguments (trolling), blatant propaganda or people who never bothered to fact check the propaganda.
They also create an inordinate amount of communities, had to use the “block instance” button a lot.
NSFW stuff also gets annoying after a while, but that seems less prevalent. (Just had to block one instance to get 99%)
Looking at my block list, the AI images and niece music stuff also got added at some point.
Computers can really just do two things: copy data and do math. Anytime your your doing anything but copying data verbatim, there is math involved. Anytime your reformating, filtering or acting on data their will be some math involved.
Take displaying an image: you can’t just copy image data to the screen, because it could have a different resolution, or color space, or be compressed. In all of those cases, you will need to do a lot of math to get things to work right.
The exact math varies, in graphics, CAD or geospatial stuff, expect a lot of geometry. Any sort of statistics or classifier is going to involve a lot of linear algebra. Even simply storing data in s quickly accessable manner involves quite a bit of math.
Does your car lock up outside of cell coverage? I’m not suggesting removing the radios themselves, just the antennas. To the car, it will just always be out of range.
The antenna used for talking to the keys might cause trouble, but those are either inherently short range inductive systems or are receivable using a 20$ RTL SDR to verify it’s not sending anything else.
Should be quite easy to remove any WiFi/cellular/satellite antennas from the car’s computer. (Might be trace/chip antennas, so make sure to get those). If you’re extra paranoid, get the GPS antenna too, so it can’t simply record data indefinitely.
Might take a few hours to go through the car to make sure you get everything, but you won’t be limited to super old cars.
Just add a delay that pads it out the execute time to 10 seconds. O(1) ez.
Power companies average things out.
Now some customers specifically ask to pay the instantaneous price, and those people just turn things off. This has the advantage that you end up paying less during times if low demand.
It’s just scammers trying to cash out. They know Elon has a large (and gullible) following, many of which see him as as trustworthy and a super good business man, making them easy targets.
It ends up as the usual, a scam investment promising huge returns, but of course they just run away with your money.
It’s fundamentally the same scam they use to hack accounts, posing as a rich sponsor and tricking the youtuber into downloading malware that steals their account.
You people realize that most crypto is even less private? Every transaction ever can be viewed by everyone, forever, by design.
Sure, a crypto wallet might not have your name on it when created, but good luck buying or selling any without giving away your identity.
It’s mostly that apple products are a pain to use with non apple ones. They even have a proprietary image format so something as simple as bulk copying your photos over can be a pain (each has to be manually exported through the GUI).
Doesn’t everything do this? If someone gets access to your hard drive, your fucked anyways. AI chat logs are about the least problematic thing on there.
Looking at the logs if my Stable horde worker, more then half of requests made were to generate porn. They’d be shooting themselves in the foot regardless of if the filter worked as intended.
Randall did the math on this one: https://what-if.xkcd.com/31/
He assumes 64 GB microsd cards, if you use 1 TB ones, you could send 16 times more.
Easiest and most secure way? Mail (or hand deliver) a flash drive. That’s how they transfer data between super computers and data centers. (AWS even has dedicated trucks to do it)
No one’s gonna talk about how they turned referral links into a piramid scheme?
Get a display case and put a note with the story on it. That way it’s clear its being kept from historical/sentimental value and not because you like Nazis.
Hot take, C is better then C++. It really just has one unique footgun, pointers, which can be avoided most of the time. C++ has lots of (smart)pointer related footguns, each with their own rules.
On the ground, near bus stops, parking lots, gas stations, anywhere people use them.