• 8 Posts
  • 684 Comments
Joined 1 year ago
cake
Cake day: October 20th, 2023

help-circle
  • Part of it is the same “human speech” aspects that have plagued NLP work over the past few years. Nobody (except the poor postdoctoral bastard who is running the paper farm for their boss) actually speaks in the same way that scholarly articles are written because… that should be obvious.

    This combines with the decades of work by right wing fascists to vilify intellectuals and academia. If you have ever seen (or written) a comment that boils down to “This youtuber sounds smug” or “They are presenting their opinion as fact” then you see why people prefer “natural human speech” over actual authoritatively researched and tested statements.

    And… while not all pay to publish journals are trash, I feel confident saying that most are. And filtering those can be shockingly hard by design.

    But the big one? Most of the owners of the various journals are REALLY fucking litigious and will go scorched earth on anyone who is using their work (because Elsevier et al own your work) to train a model.



  • People tried that.

    reddit corporate will remove those mods and ask which other mods want to be super duper awesome and be able to say they moderate another N thousand users per day for zero pay. And people leap at that.

    Until the users leave, nothing will happen. In a fucked way, reddit corporate are doing everyone a favor by removing the spineless “We are going to go silent for 24 hours with no real demands or bargaining power” idiocy.








  • If y9ou are close enough to a system of importance that you can spray it, you are close enough to compromise it in countless other ways.

    This is just one of many physical access attacks. Just like “you could take a hammer to it”

    Like, I know people want to think this is some Ocean’s Eleven heist waiting to happen. It isn’t. This is only viable if you can drench an area with helium (which means you can already gas everyone you care about) or you have such close physical access that there are so many other things you could do. At best it is an episode of Burn Notice where Michael has to rapidly improvise an escape where his CIA handler of the week already refused to give him something much more useful.






  • … mostly the other way around?

    Theoretically it is possible that a compromised machine could compromise a USB stick. If you are at the point where you are having to worry about government or corporate entities setting traps at the local library? You… kind of already lost.

    Which is the thing to understand. Most of what you see on the internet is, to borrow from a phrase, Privacy Theatre. It is so that people can larp and pretend they are Steve Rogers fighting a global conspiracy while necking with a hot co-worker at an Apple store. The reality is that if you are actually in a position where this level of privacy and security matters then you need to actually change your behaviors. Which often involves keeping VERY strong disconnects between any “personal” device and any “private” device.

    There have been a lot of terrible (but wonderfully written) articles about journalists needing to do this because a government or megacorporation was after them. Stuff like having a secret laptop that they never even take out of a farraday cage unless they are closer than not to an hour away from wherever they are staying that night.


  • I think any “privacy oriented OS” is inherently a questionable (kneejerk: Stupid and reeks of stale honey) strategy in the first place.

    A very good friend of mine is a journalist. The kind of journalist where… she actually deals with the shit the average person online larps and then some. And what I and her colleagues have suggested is the following:

    Two flash drives

    • One that is a livecd for basically any linux distro. If you are able to reboot the machine you are using and boot to this, do it. That helps with software keyloggers but obviously not hardware
    • One that is just a folder full of portable installs of the common “privacy oriented” software (like the tor browser) supporting a few different OS types.

    Given the option? Boot the public computer to the live image. Regardless, use the latter to access whatever chat or email accounts (that NEVER are logged into on any machine you “own” or near your home) you need.