
On the plus side, the US government has now ensured Anthropic will do more than the bare minimum in the US.
Of course, that means it’s now OpenAI making kill decisions.

On the plus side, the US government has now ensured Anthropic will do more than the bare minimum in the US.
Of course, that means it’s now OpenAI making kill decisions.

Next up: Dems working on secret report found Epstein and Trump were friends!
I’m left with the same questions at the end of that as at the start.
Also, how does OAuth integrate with Passkeys? Because they seem like compatible concepts.

Isn’t “theshamblog” AI generated? So in this case, including the Ars article it’s referencing?
The pieces are dated 2024.

On a corruption index, shouldn’t 100 mean entirely corrupt?
Either way, the US doesn’t look good, but this seems to be an integrity index.

Trump also trash talked his longtime friend Epstein.
So what would happen if everyone registered as a republican and voted for socialists in the primaries?

For some reason I read that as motorcycle the first time. I was imagining a motorcycle with a sofa sidecar.

Hopefully that’s not what he’s saying. I hope what he’s saying is that the neoliberal Democrats aren’t in opposition to the crazy actions the Republicans are taking, and so anything they’re doing to stop them is purely performative.
Still not quite sure I agree with this, but I’m pretty sure that’s what the OP was arguing.
Isn’t that functionality built in to the OS? Set up parental controls, and you can do this with no extra apps needed. It’ll even generate reports.
Using Shortcuts, you can even map these profiles to different Focus modes.
This might be romanticizing the early Internet.
I can remember plenty of flame wars in the late 80s and early 90s that were all about shutting down meaningful discussion. Informed debate flourished in niche areas, but it still does today, in a similar volume. What’s changed is the massive volume of social media that’s grown up around it, including many types of voices that were in short supply on the Internet in 1989, and many of which are uneducated and/or tribal in nature.

2024 was unfair because he didn’t win by a landslide.

Did you try tweeting your rep? That seems to be the only way to get their attention these days.

The problem is, if she exits now, what sane firm would hire her?

Nothing xenophobic about it. That’s just the model we already have documented information about. Notice I mentioned CCP and government, not “the Chinese”.
That’s like calling someone an antisemite for being against the Israeli or Iranian government.

Yes; they’re the ones that survived.
Where I grew up, the “local tribe” had been migratory slave traders who expanded into the area shortly before Europeans showed up. They then proceeded to sign a treaty granting them the whole area, including parts where they had never actually settled.
Unlike the other tribes in the area to whom ownership was a foreign concept, they not only understood what was going on, but figured out how to profit from it. So they now have massive treaty lands that had been managed by a different nation for thousands of years prior to European settlement.

They may be playing the OTHER Trump card… that is, implicating Trump.

Ollama with standard Gemma2 model open to the Internet. What could go wrong?
I call out this one because the Chinese government has already examined it for exploits and flaws.
Letting it run outside a sandbox on the Internet is tantamount to sharing any information and capabilities it has with the CCP.
Along with what others are saying… only the least damning half of the files have been released so far. He’s not absolved until the complete unredacted file set has been reviewed by someone no likely to cover for him.
And even there; he’s already a convicted felon; all he could possibly be absolved of at this point is… I’m not sure what.
Key summary:
A device authenticated to a wifi router can abuse MAC IDs to become an AitM between the router and any other device on any of the router’s networks.
This attack can be pulled off from a compromised IoT device on a guest network that is supposed to be limited to Internet access and not be able to see other devices.