|
Are you saying that the CAPTCHA itself is somehow a tracking device?
Could you elaborate on that, I'm quite interested to learn how.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
No, I'm saying that many sites that use CAPTCHAs only do so when you access them through a VPN, and the motivation for discouraging use of a VPN can be so that it's easier to track you.
|
|
|
|
|
Greg Utas wrote: No, I'm saying that many sites that use CAPTCHAs only do so when you access them through a VPN, and the motivation for discouraging use of a VPN can be so that it's easier to track you.
It's obviously that and not that by using a VPN you're co-mingling your well behaved activity with that of various malicious idiots running bots, resulting in the VPNs IP address being flagged as high enough risk that all traffic on it is being slammed with a captcha to stop - or at least slow - the botherds.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
|
|
|
|
|
They assume the site users are going to are not a waste of time. (Could it be that CAPTCHAs prevent enough people from going to sites that it's a wash?)
|
|
|
|
|
Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society. "My birth cry will be the sound of every phone on this planet ringing in unison."
|
|
|
|
|
Another that might fit...
Quote: Human decisions are removed from strategic defense. Skynet begins to learn at a geometric rate. It becomes self-aware at 2:14 a.m. Eastern time, August 29th. In a panic, they try to pull the plug. Skynet fights back
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
And then Skynet East gets into a fight with Skynet West. Skynet North gets distracted with pictures of delidded CPUs and Skynet South gets depressed and offs itself.
|
|
|
|
|
We don't really have that much to fear from AI. If it gets out of control, I'm sure some Russian will be able to hack into it and make it stop.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
People may be reluctant to give their personal information to artificial intelligence (AI) systems even though it is needed by the systems for providing more accurate and personalized services, but a new study reveals that the manner in which the systems ask for information from users can make a difference. "You have 5 seconds to comply. 4. 3. 2. 1. I am now authorized to use physical force! "
|
|
|
|
|
Is there any need on it asking for personal information?
The AI just need a request to Google or FB servers... They have more than we can answer back.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Quote: The researchers said that traditional AI dialogues usually offer introductions that frame their role as a helper.
In fact, power users may be put off by the way AIs typically communicate with users, which may seem patronizing to them,
...
On the other hand, when an AI system asks users for help, it is seen as social
Nah. Both cases sound like Big Tech begging me for more data to better violate my privacy (see farsebook's abuse of the phone numbers they claimed to only need for account verification purposes for a particularly blatant example); in either approach they can go themselves and die in a magic smoke release.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
|
|
|
|
|
Dan Neely wrote: Nah. Both cases sound like Big Tech begging me for more data to better violate my privacy (see farsebook's abuse of the phone numbers they claimed to only need for account verification purposes for a particularly blatant example); in either approach they can go [mastadon] themselves and die in a magic smoke release. This.
|
|
|
|
|
'I got bored sitting at home while retired ... I chose to go back to my roots' He couldn't do that before retiring?
"This is Microsoft's way of giving back to Python." <- I'm sure the Python folk will be delighted and enthusiastic about this.
|
|
|
|
|
|
Kent Sharkey wrote: I'm sure the Python folk will be delighted and enthusiastic about this. Probably the same as linux users are with WSL
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Wenyan is built on its namesake, Classical Chinese (or Wényán), the written form of Chinese used from the 5th century BCE to the early 20th century. Crouching tuple, hidden debugger
Yeah, yet another programming language used by one person, but it amused me. (Plus, you know - slow news day)
At least it's not Plain English
|
|
|
|
|
Kent Sharkey wrote: Crouching tuple, hidden debugger Featuring "House of flying bugs" and "Curse of the golden script"
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
With Project Moca, you can simplify your workflow so you can focus on what matters. Add tasks, goals, notes, files from OneDrive and other cloud storage providers, links, contacts, and even emails and events, all into one dynamic space. And now you have one more space to update everything!
|
|
|
|
|
MIT researchers have created a new system that automatically cleans "dirty data"— the typos, duplicates, missing values, misspellings, and inconsistencies dreaded by data analysts, data engineers, and data scientists. DROP TABLE messy
|
|
|
|
|
Colonial Pipeline paid hackers nearly $5 mln in ransom - Bloomberg News | Reuters
"...Colonial Pipeline paid nearly $5 million to Eastern European hackers on Friday after a crippling cyberattack that shut the largest fuel pipeline network in the United States, Bloomberg News reported, citing two people familiar with the transaction...."
I was surprised they were able to restart their operation that quickly; this answers that.
Since 5$ million is that that much money for that kind of company, We'll see how many infrastructure companies of that size will get hacked in the next few week.
CI/CD = Continuous Impediment/Continuous Despair
|
|
|
|
|
I work in a different industry and yesterday I got a call from the boss who said another organization in our industry was hit by ransomware so the call was made to back everything up including software and production systems. I've been doing it for years so I didn't change a single thing I was doing. Apparently this was a big thing for some people though.
BTW - this hasn't hit the news yet and they are trying to keep it quiet enough that it doesn't. I'm not sure how they are going to explain why hundreds people are not working so I expect a leak any day now. I don't even know who the organization is because I wasn't told. I just know it wasn't us.
"They have a consciousness, they have a life, they have a soul! Damn you! Let the rabbits wear glasses! Save our brothers! Can I get an amen?"
|
|
|
|
|
Use image backup every night and swap out the drives daily and you can thumb your nose at those crooks. Of the ransomware attacks that have happened to our customers over the years not one has had to pay a dime and being back and running was as easy as restoring the image.
World infrastructure cats, get a clue.
Windows server backup, Acronis true image, Image for Linux,Apple Time machine, there is just no excuse.
|
|
|
|
|
When the hackers look for quick money, that will work.
But some are more diligent. After infecting your system, they'll wait a couple of month, till they are sure that all your backups are infected with their malware too. And when you restore from the infected (though not yet encrypted) backup, they'll just ...
But of course, that comes with a different risk for the hackers: another group may be faster.
Oh sanctissimi Wilhelmus, Theodorus, et Fredericus!
|
|
|
|
|
Oh... I should have read all the messages before answering... you brought up exactly the same point I wrote... deleting redundant message.
You just answered to Rick and this fits more answering to Ron
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Quote: he hackers provided Colonial Pipeline with a decrypting tool to restore its disabled computer network after they received the payment, but the company used its own backups to help restore the system since the tool was slow,
So, they wasted the $5 million anyway.
|
|
|
|