

So… Riddle me this: What’s the difference between ‘states invading each other’ and ‘civil war’?
So… Riddle me this: What’s the difference between ‘states invading each other’ and ‘civil war’?
Since AMP, yes. It’s hardly a recent development.
Ooh, that’s though sweetheart. If the owners of those servers want you to visit, they’ll just choose another WAF than CF’s.
All zero of them.
“Stop people using VPNs for anything”, more like. Knock it off, you fascist fucks. Get out of my computer, my bedroom and my life.
Well, yeah. It’s sometimes referred to as ‘tact’.
No, that’s a good point. We all bloody well know there isn’t a single provider of LLM’s that aren’t sucking the entire Internet dry while gleefully ignoring robots.txt and expecting everybody else to pay the bill on their behalf, but the AI providers are getting really good at using other people IPs both to mask their identity and to evade blacklists, which is yet another abusive behavior.
But that’s beside your point. So forget the class-action lawsuit in favor of the relevant Ombudsman.
Either way, this cannot go on. Donation-driven open source projects are being driven into the ground by exploding bandwidth and hosting costs, people are being forced to deploy tools like Anubis that eats additional resources - including the resources of every legitimate user. The cumulative damage this is doing is no joke.
If this isn’t fertile grounds for a massive class-action lawsuit, I don’t know what would be.
The recent relentless AI-ification is another pain-point. People are getting sick of having to constantly fend off slob pull requests.
Here’s hoping it isn’t a windy day. Or raining.
Nobody said they replicated by authoring the replica from scratch, which seems to be what you’re assuming. A generative AI is ultimately a lump of code and a statistical model. Surely you’re not saying that it cannot copy files given file system access.
Because copying some files and starting new processes is all it really has to do to ‘self replicate’.
What a legend. Kudos!
Yeah, that sounds exactly like what everybody were looking for in an OS. /s
I’ve been very happy to be using Linux for the past decade and a half, but never more so than now.
I can certainly see why you took the picture. Nobody would believe you without photographic evidence.
That’s the most extraordinary example yet. How do you even locate these, uh, remarkable examples of craftsmanship?
I’m no lawyer, let alone a US lawyer, but can somebody explain how this isn’t a violation of the Computer Fraud and Abuse Act, which makes it a federal offense to intentionally access a “protected computer” without authorization or by exceeding authorized access?
See, this is what I like about the Internet: No matter how obscure, a subject matter expert is almost always right there.
Thanks, buddy.
I maintain that the definition of wrong is a function of the intended outcome. The former method is absolutely the correct approach for obtaining 2 dimensional horse-smoothies. And morbidly repainting the workshop.
Straight to the middle of his designated landing zone. As we all know, he’s a well prepared kitty.
I personally think of myself as more of an asshole, but tomayto, tomahto.