Comment Re:Tech illiterate (Score 1) 77
That's good for dealing with snooping. This is an issue of a government squelching speech because it knows what servers to attack. Maybe a webmail provider that works through TOR would be better.
That's good for dealing with snooping. This is an issue of a government squelching speech because it knows what servers to attack. Maybe a webmail provider that works through TOR would be better.
The best call center staff I ever encountered were from the era of workstations before x86 PCs and Linux completely took over that market. Developers were required to do rotation at tech support. The result of this was that callers would frequently find themselves talking to the person who had a significant hand in creating the software or hardware with which the caller had a problem. That alone resulted in much quicker and satisfying solutions than any script-reader could hope to accomplish, let alone a pseudo-AI program.
I've come to arrange a holiday.
For something like that, I would be inclined to call 911 to report a stuck door keeping people in a building. Then firefighters would pry the thing open, probably destroying the mechanism. Maybe the owner of the thing would be able to get away without charges of false imprisonment and/or civil lawsuits.
Not really:
Then: "Without slaves, who will pick the crops?"
Now: "Without illegal immigrants, who will pick the crops?"
Just whip it.
Why would the DMCA have anything to do with something like this?
Fake footage isn't necessary. You just need footage that DID happen, but continually lie about the circumstances. This technique has proven very reliable.
Remember that what we call AI really isn't. It's just a more advanced iteration of the programs used to create fake scientific papers from 10+ years ago. They're not going to take over humanity. Instead, the threats are from where they've always come from: evil people with lots of ambition. North Korea, China, and Russia already did this to subjugate their populations. So did Germany, Italy, and Cambodia among many others. All of them found that exploiting the stupid and gullible by way of mass media to create shock troops of enthusiastic thugs was very effective. Events of the past 15 or so years show that this technique remains effective: roadblocks, rioting, looting, arson, IEDs, harassment, extortion, assault, murder -- all executed by enthusiastic mobs.
I had professors curse people like you when they wrote their own textbooks, all of which I still own because they're that good.
You seem rather sheltered in your experiences with science being infected with politics. The proper and ethical way of declaring that something doesn't exist is to do at least some token research first. Clearly you didn't do that.
The chances of this new system getting hacked is 100% and will likely be hacked with a few weeks at most of work. I suspect that these price labels will follow the pattern of IOT gadgets having really terrible security.
Sounds like this would be a boon for carjackers and other violent criminals who depend on their victims stopping on demand,
Someone over at x.org did a non-trivial amount of thinking on what X12 would look like.
https://www.x.org/wiki/Develop...
It's careful to say that there isn't an X12 project, at least as of September 2017.
Why would I do this? If I want to listen to a delusional and hallucinating psychotic jerk, I'd visit Reddit with a screenreader.
"All my life I wanted to be someone; I guess I should have been more specific." -- Jane Wagner