We tend to forget that all of that is to support people. Tech shouldn’t be an end goal, merely one of the ways to achieve it. And not always the best one at that.
We tend to forget that all of that is to support people. Tech shouldn’t be an end goal, merely one of the ways to achieve it. And not always the best one at that.
Truely a nice one. The community around it is quite cool as well.
Or make sure you can hook it to something like home assistant without reliance on cloud…
By bike even… passenger vehicles -even EVs are frowned upon these days…
And forget the clamp in the process ?
Your examples are clear indication that you know jack shit about actual police work. Admittedly in civilised countries where there are checks and due process. Cops aren’t getting access freely to comms. A magistrate can depending on circumstances. And there’s plenty of red tape everywhere. Even telco operators will refuse to respond to a request if not absolutely justified. And typically that’s not when timmy sold some shit to his neighbour. Organised crime, murders, rapts… instances of those with actual victims are not threats, they are shits that happen and needs to be sorted.
Lemme be the judge of that… grow a bit and put your argument on the table.
Don’t hesitate to develop…
Call interception, retro and all methods of investigation relying on télécommunications are, and need to remain, a tool available for police forces when the crimes they are investigating are greatly impacting society. Having a prosecutor request those within acceptable limits is a net positive. Not the same as having dragnets spying on everyone in the hope of hitting keywords mind.
But criminality is using more and more complex tools at their disposition and there’s just no way of policing like in medieval times anymore.
Working server side much? Pretty sure a lot of us spend a lotta time on fixing shit unrelated to either of those 3… Not that it diminishes the merit of our IT support dude that endure due to those 3 indeed.
They are active in whistleblowing, not privacy leak management…
Nha they publish metadata describing the leaked data. If you’re a data subject concerned by the incident you then request a copy of yr information which requires proper identification.
Why would they share the data itself….
Would you happen to have one to recommend to switch from Spotify to apple music? I’m thinking about moving but my playlists are keeping me from leaving.
I discovered the vinegar as a condiment with vinegar salt potato chips. Then I found out the fries. Sooooo good.
Ho yeah that reminds me of spicy honey on cheesy pizzas… maybe my best memory from l.a.
At this point they are somewhat catching up on what traditional banks are doing it seems…
Typically llm are rather ressource intensive - you need beefy hardware to run those at speed. Especially if you intend to train them with your data to improve their relevance. I don’t think mobile phones or run to the mill laptops are going to be enough for any non-trivial implementations. I might be skewed by experiences on non-personal projects though.
This smells of Pratchett :)