

So it’s basically “nobody wants to use it because nobody is using it.”
I actually rather like it, and at this point many of the tools I use have caught up so I don’t mind it any more myself.
Basically a deer with a human face. Despite probably being some sort of magical nature spirit, his interests are primarily in technology and politics and science fiction.
Spent many years on Reddit before joining the Threadiverse as well.


So it’s basically “nobody wants to use it because nobody is using it.”
I actually rather like it, and at this point many of the tools I use have caught up so I don’t mind it any more myself.


I’ve found that a lot of the people who complain the loudest about the costs of AI also seem to refuse to believe that local AIs are even possible. Quite frustrating.


It comes down to whether you can demonstrate this flaw. If you have a way to show it actually working then credentials shouldn’t matter.
If your attempts at disclosure are being ignored then check:
Try to resolve those. If the company you’re trying to contact is still send your emails to the spam bin, maybe try contacting other people who have done disclosure on issues like this before. If you can convince them then they can use their own credibility to advance the issue.
If that doesn’t work then I guess check the “deranged crazy person” things one more time and move on to disclosing it publicly yourself.


The Coordinated Vulnerability Disclosure (CVD) process:
Discovery: The researcher finds the problem.
Private Notification: The researcher contacts the vendor/owner directly and privately. No public information is released yet.
The Embargo Period: The researcher and vendor agree on a timeframe for the fix (industry standard is often 90 days, popularized by Google Project Zero).
Remediation: The vendor develops and deploys a patch.
Public Disclosure: Once the patch is live (or the deadline expires), the researcher publishes their findings, often assigned a CVE (Common Vulnerabilities and Exposures) ID.
Proof of Concept (PoC): Technical details or code showing exactly how to exploit the flaw may be released to help defenders understand the risk, usually after users have had time to patch.
You say the flaw is “fundamental”, suggesting you don’t think it can be patched? I guess I’d inform my investment manager during the “private notification” phase as well, then. It’s possible you’re wrong about its patchability, of course, so I’d recommend carrying on with CVD regardless.


I’m sure this thread will have more than just knee-jerk scary “feels” or inaccurate pop culture references in it, and we’ll be able to have a nice discussion about what the technology in the linked article is actually about.


If you believe that Google’s just going to brazenly lie about what they’re doing, what’s the point of changing the settings at all then?
In fact, Google is subject to various laws and they’re subject to concerns by big corporate customers, both of which could result in big trouble if they end up flagrantly and wilfully misusing data that’s supposed to be private. So yes, I would tend to believe that if the feature doesn’t say the data is being used for training I tend to believe that. It at least behooves those who claim otherwise to come up with actual evidence of their claims.


You are being sarcastic but this is indeed the case. Especially for companies like Google, which are concerned about being sued or dumped by major corporations that very much don’t want their data to be used for training without permission.
There’s a bit of a free-for-all with published data these days, but private data is another matter.


Yes, they are. Not sure why you are bringing that up.
I am bringing it up because the setting Google is presenting only describes using AI on your data, not training AI on your data.


Yes, exactly. Training an AI is a completely different process from prompting it, it takes orders of magnitude more work and can’t be done on a model that’s currently in use.


I have yet to see any of these news sites show evidence that this setting is for allowing training with your data. That’s not what the setting itself says, it seems like this is just a panicked ripple of clickbait titles sweeping rapidly across social media on a wave of AI dopamine.


Yes, but the point is that granting Google permission to manage your data by AI is a very different thing from training the AI on your data. You can do all the things you describe without also having the AI train on the data, indeed it’s a hard bit of extra work to train the AI on the data as well.
If the setting isn’t specifically saying that it’s to let them train AI on your data then I’m inclined to believe that’s not what it’s for. They’re very different processes, both technically and legally. I think there’s just some click-baiting going on here with the scary “they’re training on your data!” Accusation, it seems to be baseless.


Understand that basically ANYTHING that “uses AI” is using you for training data.
No, that’s not necessarily the case. A lot of people don’t understand how AI training and AI inference work, they are two completely separate processes. Doing one does not entail doing the other, in fact a lot of research is being done right now trying to make it possible to do both because it would be really handy to be able to do them together and it can’t really be done like that yet.
And if you read any of the EULAs
Go ahead and do so, they will have separate sections specifically about the use of data for training. Data privacy is regulated by a lot of laws, even in the United States, and corporate users are extremely picky about that sort of stuff.
If the checkbox you’re checking in the settings isn’t explicitly saying “this is to give permission to use your data for training” then it probably isn’t doing that. There might be a separate one somewhere, it might just be a blanket thing covered in the EULA, but “tricking” the user like that wouldn’t make any sense. It doesn’t save them any legal hassle to do it like that.


But then the roof has to support the entire weight of planet Earth on top of it, which is a much harder engineering challenge than pumping the electricity in the first place.


Actually, it’s about a guy tweeting that it’s about training AI on your emails. It doesn’t look like anything like that is mentioned in the actual text describing the features themselves.
This is a good example of why jumping to burn-the-witch conclusions “without reading” is perhaps a bad idea.


I’m not seeing where any of this gives Google permission to train AI using your data. As far as I can see it’s all about using AI to manage your data, which is a completely different thing. The word “training” appears to originate in Dave Jones’ tweet, not in any of the Google pages being quoted. Is there any confirmation that this is actually happening, and not just a social media panic?
Very much this. There are some views that are so pervasive here that people don’t realize that alternative views are even possible, that anyone who says otherwise must be faking or trolling in some manner.


Yeah, I was going to recommend this one too. IMO one of the more realistic depictions of how memory-editing technology would work, at least in terms of what the technical requirements would be. All the inside-the-head stuff was just good cinema, not necessarily realistic.


So far. Since Terminators are capable humanoid robots and the goal is to make capable humanoid robots each improvement is going to look more like a Terminator. And also like every other capable humanoid robot from other sci-fi as well, good bad or neutral.
The only reason to leap to “OMG it’s a Terminator!” Is to bait the clicks.


I mean, it’s perfectly sound advice. Don’t enable features you don’t understand. There are already plenty of features in Windows that would be privacy or security problems if you enable them without understanding what they do or how to use them.
It works because the .png and .jpg extensions are associated on your system with programs that, by coincidence, are also able to handle webp images and that check the binary content of the file to figure out what format they are when they’re handling them.
If there’s a program associated with .png on a system that doesn’t know how to handle webp, or that trusts the file extension when deciding how to decode the contents of the file, it will fail on these renamed files. This isn’t a reliable way to “fix” these sorts of things.