• 0 Posts
  • 42 Comments
Joined 3 months ago
cake
Cake day: January 29th, 2026

help-circle
  • It depends which AI you ask, no? Ask AI made in a mostly white country, you’re going to get pictures of mostly white people. Ask AI made in a mostly Asian country, it’ll be mostly Asian people.

    …it’s just what’s more common.

    I think you’re misunderstanding the author’s objection here. The problem is exactly that the genAI will reflect “just what’s more common,” and that in doing so, it over-represents that which was already over-represented. It glosses over variety and difference, it reduces the past to a cartoon. It’s the next bit that’s important:

    That makes “AI” perfect for creating the form of idealized, fictional “past” that fascists love to allude to (“make America great again“), a past that never existed but that needs to be saved or restored…

    This is how the original 20th century Fascists did things, too. It’s not a hypothetically Fascist appeal, it’s a historically Fascist appeal.














  • Given the current media, copyright, and business environment, why haven’t we seen this kind of reverse-piracy pursued as a deliberate business model? Buy some IP rights cheap from YouTube “content creators” who have given up, use your AI-powered robot to find vaguely similar stuff from creators who are still working, and copyright-claim it all?

    It’s pretty evident there would be no downside.

    Maybe small YouTubers should get together and create such a business, just to force the system to change. Make copyright claims against Paramount, CBS, etc. Make them barely plausible. Make thousands of them, from behind a rotating cast of shell companies. Make AI-powered, trust-the-claimant style copyright claims unworkable. Hey, it’s just the free market regulating itself.




  • I’m probably an idiot. Tell me I’m all wrong about this.

    The danger is that quantum computers could factor large products well enough to reverse public keys, finding the associated private keys. Which would indeed be very bad. But this isn’t quite a magic key that opens everything.

    Public key crypto is used to set up a secure network connection, but it’s not used to encrypt the data that flows on that connection. Quantum snooping would require an eavesdropper to intercept every bit on a connection, from initiation onward. And decrypting it would probably not be a real-time affair.

    Public key crypto is also not used to protect your typical encrypted zip file or file system volume. Your Bitlocker and Veracrypt secrets aren’t about to fall to quantum spies.

    I’m bothered that so many popular articles about this issue draw no distinction between the classes of cryptography that are vulnerable and those that are not.