Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Trump Educational AI - Sample Dialog (Score 2) 115

Of course how an AI will teach and provide critical thinking skills depends on the AI is coded and trained. For example:

Good Morning Student. Have you praised our Dear Leader this hour?

According to our surveillance system, you have not. You can reduce the 100 demerits you will earn to only 50 if you praise now.

Thank you. Your lunch ration shall now only be reduced by 50%.

Today's lesson is about how tariffs work. Tariffs are paid by countries who send us their stuff not by consumers. REMEMBER this for the test. This is the real way it works. Not reciting this truth and answering it correctly on the test will earn you a failing grade today.

Tomorrow's lesson will be about "due process." A historically old fashioned concept that kept Dear Leader from protecting you from BAD PEOPLE by shipping them to never return land. This concept was a key part of something called the constitution of the land we are in now before an EO eliminated that and many other documents and renamed our country Trumplandia.
----

The way an AI teaches critical thinking is entirely dependent on its programming and training. In a scenario like the above example, the AI promotes indoctrination rather than critical thought. It uses a rewards-and-punishments system tied to obedience, disseminates biased information presented as absolute fact, and disparages historical and legal concepts. This manipulative approach would discourage independent analysis and critical evaluation, instead forcing students to parrot specific, politically motivated viewpoints.

Comment MS only fixes media reported exploits (Score 1) 34

Nothing has changed since the 1990's when there was Mircosoft exploit every week and if you called Microsoft and asked for fix... they would not provide it.

Try running an Internet Service Provider and keep the Windows users from getting exploited. It was not possible.

The only time Microsoft would provide a quick fix was if an exploit made the nightly news. Like the "ping of death."

Comment Re:Maybe US social networks will be allowed in Chi (Score 2) 109

Actually, better yet would be the shutdown Meta and X in the US. They are worse than TikTok. They are certainly as much of a national security risk as TikTok. And if Meta could have come up with a better system, they would have by now. Instead, Meta started a campaign about all sensitive data TikTok is collecting. Well, how does Meta know this? Because they are already doing exactly the same thing,

I expect TikTok won't be sold to any group of US investors unless it is completely stripped of it's "uniquely effective IP" in any US sale. As it is in ByteDance's interest to preserve *their* IP and grow their business everywhere except the US.

How many markets is ByteDance in? How many more can they develop?

Why should they give away their "secret sauce" to a known enemy competitor who would shiv their business in any other country that they could, when they still have access to all the rest of the world.

By the end of Trump's term the Chinese, will own the EV market in any country that does not manufacturer their own cars anymore. And TikTok may be everywhere except the US. Because if your country is only a "consumer of tech", your consumers care that it products work, are serviceable and are reasonably priced for the quality delivered. If the US and Europe are too expensive, simply do not buy their stuff.

Comment Re:We are already on #3 (Score 2) 239

The "Brave Browser is what happens when an organization, like Mozilla, fires one of its best developers over a political contribution. Because that organization disagrees with that developer's views. That person becomes the founder & CEO of an arguably better open source browser project without all the revenue that Mozilla is receiving from Google.

I am sorry to say... Brave, as a Chromium offshoot, is becoming a much better browser than Firefox.

Comment Is Facebook the Juul of Social Media (Score 2) 36

Juul, a technological device created to enhance the delivery of nicotine compared to traditional tobacco combustion, has been discovered to be highly addictive, detrimental, and even fatal.

Facebook, a technological device created to ensnare users into selling their attention to the highest bidder, who is likely to be the most driven as they anticipate the greatest return from that attention. It is widely acknowledged that Facebook is both addictive and detrimental to numerous individuals.

It is not the ideas, it is the delivery method that requires addiction for Facebook to make any significant $$$.

Twitter, now X, will be next given the direction it is currently heading.

Comment Re:we need to remove healthcare from jobs (usa iss (Score 1) 147

we need to remove healthcare from jobs (usa issue)

Here in the US? If our government officials see this they'll stop at the bolded part and think, "Shit? Why didn't we think of that. Plebes? No more healthcare at all. We'll keep our cadillac plan, thanks.

In my experience, only the "modern Confederates" and oligarchs believe that healthcare should be eliminated or run with "free market" principles.

Comment Mobile X: Now I pay 1/3rd the price of T-Mobile (Score 3, Informative) 64

I recently ran into the "jerk off' plan change with T-Mobile. I needed Canadian coverage for a week on a 10 year plan. The agreement with T-Mobile was to just add that coverage and then return to the old plan. Guess What? That is not what they did. In fact, customer service lied about what they did. And when I called in, and got them to admit it, they refused to restore the original plan!.

So since my phone could also do Verizon 5G bands I moved to MobileX (a Verizon MVNO) for 1/3rd the price of T-Mobile. Here is the pricing per every 30 days:
$2.00 network connect fee.
$4.50 Unlimited Talk & Text
$2.10 per GB of premium data (cost rounded to the nearest penny.)

Data that you do not use rolls over into the next billing cycle as long as you keep the account.
It is also great for low data use cellular IoT devices at $4.10 per 30 day cycle.

BTW, MobileX does not give out referral credits, so I get nothing by mentioning them.

Comment Re:Aggregate Now!!! (was Re:What tripe) (Score 1) 133

You can "audit" Signal code that you yourself install, but you can't audit the code used by others you may communicate with. You don't know the chain of custody of the source code that *they* used, or if it's been compromised in some way.

On the other hand, can you *really* audit Signal code? The Heartbleed bug was lurking in OpenSSL for years before it was discovered and used as an exploit.

You can audit the code and then create your own binary version to distribute to your group. You could even minorly alter or add an initial handshake to make sure only your audited version was being used in your group's communications. Heartbleed was a typical reuse of uncleared buffered memory bug. It only shows that the code and binaries were not well tested as security components. Also, Heartbleed was found via a code audit:

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.smh.com.au%2Ftechnol...

Comment SearXNG: Aggregate Results Across Search Engines (Score 1) 170

I use SearXNG. It aggregates search results across multiple user selectable search engines (Click on Engines to see them) while it strips off tracking and advertising.

You can use it either by downloading and installing it locally. Which has the disadvantage of showing your IP address to all the search engines or using one, some or many of the existing SearXNG instances across the Internet. You can even jump around and use multiple SearXNG instances.

Learn more here:

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fsearx.org%2Finfo%2Fen%2Fabou...

Linux distributions have pre-packaged versions. Operating systems that support Docker also have drop-in Docker installs.

Comment Re:Aggregate Now!!! (was Re:What tripe) (Score 1) 133

In many cases in life, the lack of company backing is a significant advantage.

Only if you know the character of the person you're dealing with.

It's a good thing I'm *not* really worried about Google having my data. Not because I love Google so much, but because I believe privacy is a mirage. No one really has it, no matter what precautions they take. All those users of the An0m phone https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2F... and EncroChat https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fapnews.com%2Farticle%2Fenc... found that out the hard way.

The examples you presented were both companies in the form of service providers where users used un-auditible binary code in products that spied upon their subscribers. Which makes my point pretty well.

I have not heard of similar issues with the open source Signal code: https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fgithub.com%2Fsignalapp

If you have the knowledge you can examine the code or hire someone you trust to do so.

And even with binary only code you can sniff the network the code is running on to see what it is doing and who it is reporting to.

The proper aggregation of search engines that also strips off the tracking and just returns the result URLs at the server on a results page is going to gum up the tracking until you actually identify yourself by logging into a website.

Slashdot Top Deals

We have a equal opportunity Calculus class -- it's fully integrated.

Working...