• 0 Posts
  • 27 Comments
Joined 2 years ago
cake
Cake day: September 11th, 2023

help-circle
  • I’m not sure if I understand what you’re talking about exactly. With root I can access all files on my device (including /data/data, where app internal files are kept) and I can give permission to apps to access all files too, it they ask for it. Not that I’d want that, because it’s way safer to keep user data in /storage/emulated/0 and give read permissions on file or folder level (like /Pictures for a gallery app, or just the picture I want to share for a social media app).

    If you want to share data between apps, the easiest way would be to give them access to the same folder in user space. That isn’t OS maker’s generosity, that’s basic security controls.







  • California-based rightsholder PCR Distributing, which operates under brands including J18 and JAST USA, initiated action against nHentai last summer, describing the site as a significant threat to its business.

    I don’t know them, but JAST sells visual novels and other software (so no hentai) and J18 is a Halland-class destroyer of the Swedish Navy, so maybe they’re being threatened by the amount of KanColle doujins showing the superior physical assets of Japanese warships.







  • This is probably because of a lack of training data, where it is referencing only one example and that example just had a mistake in it.

    The one example could be flawless, but the output of an LLM is influenced by all of its input. 99.999% of that input is irrelevant to your situation, so of course it’s going to degenerate the output.

    What you (and everyone else) needs is a good search engine to find the needle in the haystack of human knowledge, you don’t need that haystack ground down to dust to give you a needle-shaped piece of crap with slightly more iron than average.






  • Torrents are already very hard to block. You don’t actually need a tracker, because all modern torrent clients support DHT (distributed hash table). You only need some way to get the initial hash for a torrent, so that’s where trackers are still useful, but once you’re connected to the swarm, you can only be blocked if the entire swarm is blocked.

    Tracking though… It’s too easy to get IP addresses for the entire swarm and I don’t see how you could ever fix that. Tor doesn’t really solve that issue either, it just moves it to places where you won’t get in legal trouble or to people who don’t mind getting in legal trouble, a bit like VPN providers.



  • I don’t think you even need the actual stuff to train a neural network to recognize it. For example, if I wanted to train a neural network to recognize pictures of lions, but I didn’t have any actual pictures of lions, I could use pictures of lion-shaped things, lion-colored things and locations where lions might appear. If a picture is hitting all three of those, it’s very likely to be a lion. Very likely is all a neural network can do, so it’s good enough for my purposes.