Basically a deer with a human face. Despite probably being some sort of magical nature spirit, his interests are primarily in technology and politics and science fiction.

Spent many years on Reddit before joining the Threadiverse as well.

  • 0 Posts
  • 407 Comments
Joined 9 months ago
cake
Cake day: March 3rd, 2024

help-circle

  • From the Bluesky TOS:

    Bluesky Social is available as a desktop application at bsky.app and bsky.social (each a “Site”) and a mobile application (“Bluesky App” or “the App”).

    These terms only apply to social networking that happens on Bluesky Social services, including the Sites and Bluesky App. If you’re using another social networking application on the AT Protocol that isn’t Bluesky Social (we call this a “Developer Application”), the developers of the other service will provide the terms and conditions that govern your experience.

    So looks like the Bluesky TOS simply doesn’t apply. Create a developer application and give it whatever training-friendly TOS you want.



  • And is there any risk of people turning these kinds of models around and using them to generate images?

    There isn’t really much fundamental difference between an image detector and an image generator. The way image generators like stable diffusion work is essentially by generating a starting image that’s nothing but random static and telling the generator “find the cat that’s hidden in this noise.”

    It’ll probably take a bit of work to rig this child porn detector up to generate images, but I could definitely imagine it happening. It’s going to make an already complicated philosophical debate even more complicated.









  • The “how will we know if it’s real” question has the same answer as it always has. Check if the source is reputable and find multiple reputable sources to see if they agree.

    “Is there a photo of the thing” has never been a particularly great way of judging whether something is accurately described in the news. This is just people finding out something they should have already known.

    If the concern is over the verifiability of the photos themselves, there are technical solutions that can be used for that problem.