Please take no offense in this, I will probably not use your name suggestions, SatansMaggotyCumFart
Please take no offense in this, I will probably not use your name suggestions, SatansMaggotyCumFart
You’re walking in the desert and you see a tortoise
Some believe this happened years ago. Check out Dead Internet Theory.
What does it actually promise? AI (namely generative and LLM) is definitely overhyped in my opinion, but admittedly I’m far from an expert. Is what they’re promising to deliver not actually doable?
Haha yeah, I know right cries
Yeah that’s what I’m curious about; I’m used to copying code snippets or codes from websites by clicking a button (presumably through some browser API?), but am just now realizing that this in itself has security implications.
Using noscript or some such JS blocker would prevent this but break a lot of other things in the process. That’s why I’m wondering why the API isn’t locked down via some user prompt.
Why isn’t the default behavior for browsers to not allow access to the clipboard? Similar to how it prompts you for access to camera/microphone
Edit: On a per-site basis, like if you use the Zoom website it asks you for access to the webcam, would something like this work for clipboard as well or would it break stuff?
No joke, I thought for a second you were referring to Infinite Solutions and were trolling hardcore. I haven’t thought about that in a long time.
sware on me scrum
Thanks for calling attention to this. Oftentimes when a patent is applied for there is no intent to implement it. This is actually a clever way to get ahead of the direction of the market and license to other manufacturers.
Having said that, it’s still Ford, and once it’s generally accepted for this type of ad to be displayed they’ll jump on it real quick.
“Bluesky! You didn’t file your paperwork last night.”
I hear you, but there’s no reason to be angry.
When I first learned of the issue, my first thought was, “Hey our update policy doesn’t pull the latest sensor to production servers.” After a little more research I came to the same conclusion you did, aside from disconnecting from the internet there’s nothing we really could have done.
There will always be armchair quarterbacks, use this as an opportunity to teach, life’s too short to be upset about such things.
Let me tell you about my mother
Crowdshite haha gotem
sungloc.utus
What about this scenario:
Would this be considered breaking in? Probably. Here is where the analogy breaks down; if I were to leave the front door of my house unlocked, even if there’s a welcome mat outside, anyone who enters without my knowledge or consent can be charged with breaking and entering (yes, even though no actual breaking is involved).
The interesting thing with public APIs is that there are generally terms and conditions associated with creating an account and acquiring a key, though if you are hitting an unauthenticated endpoint you technically never agreed to them. In this particular case with Authy, it would probably be argued that the intent was to acquire data by exploiting a vulnerability in the custodian’s system and use it for nefarious purposes or profit. I’d call it a hack.
To build on you analogy: if you left your garage door open and people came in and started taking your things, is that not stealing?
They could bundle in my idea of having a telephone in your house, not a cell phone more like a land phone
Sorry
• • • ノ( ゜-゜ノ)
Sir, this is a Wendy’s