Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)FI
Posts
0
Comments
149
Joined
2 yr. ago

  • Developers deserve to be paid for their time though...

    Sure for many it's nothing but a hobby and they're happy to create something for free. But that doesn't mean every developer needs to do the same.

    And yes ads are a privacy nightmare and putting them into your app is bad. So either you only use apps from hobbyists or you pay for access (whether that be a set price for a finished product or a subscription for a service).

  • It's always been a thing that the only way to completely be safe after malware is yeeting the old system and getting a new one...

    And even then there have been actively exploited issues where the system gets re-infected when reloading the data from a backup. (My memory is a bit rusty on that one, but it was just data being restored, nothing that should install anything)

  • NASA Ping

    Jump
  • Once I had a board game that was a lot like this. You controlled robots on a board, and had to plan out like 5 operations (turn/step/...) each round. Chaos ensues when you have 4 people hindering (or trying to) each other.

  • Anddd... You use wifi to connect to their servers, so they'll have your residential ip (unless you got a VPN on at all times... And even then there's probs some way to fingerprint you enough). Partner uses the same wifi network and your profiles are linked again...

    There really just is no way to completely escape. Blocking all ads and trackers on a DNS level (using a pi-hole or external service like nextdns[paid, but its pretty good]). Is a good solution though, at least you won't need to actually see ads

  • In practice, there are several types of CAPTCHAs: text-based, image-based, audio-based and behavior-based.

    Computer scientist writing an article about captchas doesn't know that proof-of-work captchas exist.... Such a joke.

    Of course those don't do much against automated fake form filling, but against DDoS they're THE solution.

    Proof of work (PoW) captchas make the (computing) cost for the attacker exponentially higher than for the website. Basically the website creates a challenge, which has to be solved by the client/attacker before getting access to content. Best of all the website can set the difficulty of the challenge to anywhere from instant to seconds to solve, so normally the users don't even notice it (as it runs in the background) but once someone starts DDoS'ing the difficulty goes up.

  • Permanently Deleted

    Jump
  • So instead of spending money on extravagant expenses they could have fired 5% less people this round.... Compared to what the money is spent on that still sounds good.

    Though it indeed makes little difference in the big picture, this is still a bad image.

  • Op is not saying this isn't using the techniques associated with the term AI.

    Correct, also not what I was replying about. I said that using AI in the headline here is very much correct. It is after all a paper using AI to detect stuff.

  • For the image-only DL model, we implemented a deep convolutional neural network (ResNet18 [13]) with PyTorch (version 0.31; pytorch.org). Given a 1664 × 2048 pixel view of a breast, the DL model was trained to predict whether or not that breast would develop breast cancer within 5 years.

    The only "innovation" here is feeding full view mammograms to a ResNet18(2016 model). The traditional risk factors regression is nothing special (barely machine learning). They don't go in depth about how they combine the two for the hybrid model, so it's probably safe to assume it is something simple (merely combining the results, so nothing special in the training step). edit: I stand corrected, commenter below pointed out the appendix, and the regression does in fact come into play in the training step

    As a different commenter mentioned, the data collection is largely the interesting part here.

    I'll admit I was wrong about my first guess as to the network topology used though, I was thinking they used something like auto encoders (but that is mostly used in cases where examples of bad samples are rare)

  • Using AI for anomaly detection is nothing new though. Haven't read any article about this specific 'discovery' but usually this uses a completely different technique than the AI that comes to mind when people think of AI these days.

  • I use it all the time for the one time use cards, and it's been effortless to use.

    The data breach is of course bad, but no company is completely immune to those.

    Privacy policy... Is not a great look (especially with the marketing being opt-out and having a convoluted process...) I honestly hadn't heard about it. But even now I'll continue to use it because weighing the marketing vs my CC details out there is still not a hard choice.

  • Depending on where you live Revolut might be an option for you. Unlike privacy.com its basically just an online bank where you can open an account and send money to/from, but they offer a one-time-use credit card (which changes every time you use it).