• 0 Posts
  • 305 Comments
Joined 2 years ago
cake
Cake day: June 7th, 2023

help-circle
  • I’d think, in this case, you’d still have to legally acquire the content. So meta pirating a ton of books would still be piracy, the act of piracy would be illegal. Scraping the entire internet for publicly posted data isn’t illegal, however, so that’s still “fair game”. Of course, the internet is full of illegally posted content, so I’m not sure how you account for all that when training AI (most model makers probably don’t bother to try). “Sure, we trained our model on Disney movies, but user FartFace6969 posted them to youtube mirrored with the audio pitched up, your honor!”






  • I haven’t touched Photoshop since like CS2 I think, so really can’t compare the two, but I will say that GIMP 3 was a huge enancenent to GIMP. It now has non-destructive editing. For my common uses, this is giant. Not having to redo 8 steps because I decided step 1 wasn’t right is so nice.

    Of course Photoshop has done that for ages. My only point was that previous perceptions might be a little dated. And with the 3 update came with huge backend changes that will hopefully accelerate other feature development. Of course I’m sell on hope, but I’m excited for the future of GIMP. Also, now that 3 is out, they have been hinting that that are open to talk about a name change, which I think would be healthy if they want increased usage.





  • So I and some others here have probably sounded a bit antagonistic to you, but good on you for asking and trying to understand. Public Key Cryptography feels like magic to me too, it’s just magic that I’ve accepted exists without understanding the base math of it all. Without it, however, most of the security of the Internet doesn’t work.

    Even most symmetrical encryption (Like AES, which is how you are picturing encryption working) layers on asymmetrical encryption as a negotiation layer to share a key that both parties have but that nobody eves dropping can read. Then once the key is exchanged, they use that because symmetrical encryption is way easier for computers. But for short messages like Signal sends, it wouldn’t surprise me if they stay asymmetrical for the entire communication.


  • Signal does hold the public keys for every user. But having the public key doesn’t let you decrypt anything. You need the private key to decrypt data encrypted with the public key. So in a chat example, if you and I exchange public keys, I can encrypt the message using your public key, but only you can decrypt it, using your private key.

    Signal does run the key exchange, which means they could hand a user the wrong public key, a public key which they have the private key for, instead of the other person’s. That is a threat model for this type of communications, however, signal users can see the key thumbprints of their fellow chat participants and verify them manually. And once a chat has begun, any changes to that key alerts all parties in the chat so they know a change has happened. The new key wont have access to any previous or pending messages, only new ones after the change took place.







  • Roku started as a streaming media box. You paid them money, they gave you a box that could play Netflix and Youtube. It was a simple transaction. Unfortunately, at some point they decided to start selling/giving their OS to TV manufacturers. This was actually nice at the start. You got a smart TV who’s “Smarts” were designed by competent people. A revolution at the time. But the drive to drop prices lower and lower meant that there was no margin on the TV, which means Roku had to investigate other ways of making their revenue, AKA Ads and selling data.

    Of course, the stand alone box probably would have went that way anyways, but at least with selling a dedicated box, there is a clear financial benefit without the need to get invasive.