Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)HA
Posts
2
Comments
513
Joined
2 yr. ago

  • I’m curious. If I was to paint you using my memory, but naked, would that still be illegal? How realistic can I paint before I trespass the law? I’m fairly sure stick figures are okay.

    And do you mean that even just possessing a photo without consent is illegal? What if it was sent by someone who has consent but not to share? Is consent transitive according to the law?

    AI pushes the limit of ethics and morality in ways we might not be ready to handle.

  • The Option type would have been a better example, and make it slightly less complicated.

    Option is an enum with two variants; None and Some(T). You can chain Options with operations, describing a Monad chain, which is kind of what this meme represent.

  • Trump, Mike Johnson and their followers will walk down to the Rio Grande, separate the waters, cross, and establish their own Israel-like state in Mexico, thus fulfilling the prophecy that Irony is officially dead, and satirical publications around the world will collapse into a singularity under the weight of reality, engulfing the earth as a first plague to be released. The second plague will be a yogurt.

  • What I don’t get is how they can look at the rest of the western world backing Ukraine and not wonder “are we the baddies?” Or maybe they do and that creates cognitive dissonance too big to handle. Or they’re told all western countries are Nazis.

  • They’re one way functions. Encryption requires decryption, so you cannot lose information.

    Hash functions are meant to lose information. They cannot be reversed. What they’re good at is verification; do you have the right password? Do you have a proof that this is your message and not someone else’s?

    We already use hash functions where they make sense, but the parent is not entirely right; not all hashes and signatures are equals. Some are very quantum susceptible. Those will likely be broken real soon (think years, not decades). Some are quantum resistant.

  • There’d just be new cryptocurrencies. There are crypto algorithms that are already quantum resistant. Monero is a great example.

    You seem to be under the impression that crypto somewhat relies on current technology to exist. It’s a set of heuristics and algorithms, not a single implementation. And those can evolve for new use cases or technologies.

    What you said is akin to “if something like this could make databases obsolete”.