pending anonymous user
Not just LLMs but all kinds of models are equivlant to freeware, aka the model itself and other essential bits for it to work. I won’t even call it source avaliable as there is no source.
Take redis as example. I can still go grab the source and compile a binary that works. This doesn’t applies on ML models.
Of course one can argue the training process isn’t determistic thus even with the exact training corpus, it can’t create the same model in terms of bits on mulitple runs. However, I would argue the same corpus provide the chance to train a model of similar or equivalent performance. Hence the openness of the training corpus is an absolute requirement to qualify a model being FOSS.
Consider the level privacy of an interoperable / federated network is only as good as the node with the lowest level of privacy. The moment you connect to Meta infra, you’re feeding it data, including but not limited to who you talked with, when you online, your message frequency, and possibly a whole lot more. Then they can start linking other bits to form a complete profile of you.
It is just slightly better than installing WA., and also part of tge reasons why many Mastodon and Lemmy server refuse to federate with Meta Threads.
Can Revolut do per service as Privacy.com?
Well, I’m simply reciting what is described on the page based on my understanding. From the diagram, it does not do raw frame processing from the source (assuming HDMI w/ HDCP) as the stream remains encrypted. By the look of it, it is copy or passthrough to the muxer (as it labeled). With some magic, it muxes two encrypted streams into one and output to the video sink. How is that done I have no idea.
As OP said volume leveling is acceptable, something like this will do.
Modifying HDMI video signal is simply impossible due to DMCA and bla bla bla. But not all hope is lost though. You can overlay opaque video on top of another encrypted stream via this little box. This is an old project per se and I have no idea if still available, but with some dirty work you might able to detect the increase of volume or match of an algo or something with a total black screen overlay on top.
Yeah, for the pic you used as example, the tool will just create something that fits. Not really “unblur” the image but guess what it would be with the info it have. It will be very likely not the same face versus the original.
However, recreating background maybe easier and accurate enough for a geo guesser or a ML model to figure out roughly where the image was taken.
multiple email account? Not really. It is typically implemented using some email proxy or alias like anonaddy or simplelogin. By the look of it is multiple accounts, but in fact you’re just receiving mail forwarded to you in one account. All you have to do is append any strings as the user with your domain.
(anonaddy and simplelogin requires adhoc address generation using subdomain by them or a domain owned by you with MX records pointing to their servers)
disclosure: I’m a current customer of anonaddy. Never used simplelogin though.
For not having some infra managing “cards”, to have some infra managing app instead. Let’s be real, that infra (and managing work) most likely is being out sourced to another company. I think the “efficiency gained” is minimal, but rather the cost to operate. With apps, they can recoup some cost by selling your data.
Instead of fiddling with the limitation on Android set by Google, I think a custom crypto DAC/ADC would be far eaiser, though you need both hard and software knowledge to accomplish this. It also came with the added benefit of not processing cryptographic operations on a black box.
Still, I don’t know what goal you want to achieve and threat model is. If you are just curious if this possible, the answer will be ye with tons of hops amd hacks. If you really want security, I will advise you go another route.
Just tell them unlock their phone so you can take a look of his browser history. Works quite a few time for me.