Hacker Newsnew | past | comments | ask | show | jobs | submit | 0xdeadbeefbabe's commentslogin

Wouldn't it also become trivial to pretend to be another author?

it may become more trivial to llm your comments/blog/whatever into a different "voice", but there is so much that can be used for de-anonymization that the llm-assisted technique dont address.

for example, you may change the content of your comments, but if you only ever comment on the same topic, the topic itself is a signal. when you post (both day and time), frequency of posts, topics of interest, usernames (e.g. themes or patterns), and much more.


Hmm so like git blame?

Blocking seems really popular. I wonder if it coincides with stack overflow closing.

Wait doesn't BLE randomize the UUIDs?

Yes, I was surprised there would be enough to go on with the MAC addresses rotating and I had assumed the UUID would too, but it sounds like there's enough to go on to identify targets.

I'm using TCP/IP how about you?

We already are. TCP/IP makes it all possible.

I bet this works because of the way insta and fb work.

How about we just put them to bed once in a while?


Please elaborate on this one


I think they mean that the model should have sleep period where they update themselves with what they learnt that day.


Why not learn how to catch lobsters?


Is anyone excited to do ablative testing on it?


With such a high throughput because of sparsity, I'm particulary interested in distilling it into other architectures. I'd like to try a recurrent transformer when I have the time


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: