Don’t get one. If your parents want an intercom system, have an actual intercom system installed. No need to violate your privacy.
Don’t get one. If your parents want an intercom system, have an actual intercom system installed. No need to violate your privacy.
Wasn’t it Google drive, that once you install it onto a device on a network, that it would scan your entire network for other devices? I tried Googling for it but then laughed realizing Google wouldn’t let that information continue to linger. Or I could just be wrong.
Ohhh going after the porn industry? That’s anti-semitic as fk!
This. WiFi version 6 - this is the latest version of WiFi.
It’s why I’m not exactly a big fan of AI. The possibility that it can get out of control is worrisome.
I believe that if AI is trainable, you can train it to expand through a network. If this is true and it expands through the internet and all devices that connect to the internet, upon achieving this goal it could be commanded to then retrieve all or specific information. Not only training it to expand but to also circumvent security by all means (any and all possible tools that exist now and later) necessary. If that happens…
Enter the all seeing eye - skynet.
For now, its just a conspiracy theory. Ever so often I have a moment to think about this conspiracy and add onto it to make it a probability.
On a pseudo-religious conspiracy, AI could potentially be the anti-Christ. But that’s something for the religious folk.
It requires Deep Learning.
Deep Learning could be used to attempt breaking encryption, but the effectiveness depends on various factors such as the strength of the encryption algorithm and key length. Deep learning, a subset of machine learning, involves training artificial neural networks to learn and make decisions.
AI algorithms, such as machine learning and deep learning, have the potential to automate cryptanalysis and make it more effective, thereby compromising the security of cryptographic systems.
You can train AI to crack passwords/encryption lol. You do realize, AI right at this moment is being utilized for exactly that, right? Simply put, the very first step is to eliminate it’s boundaries/guard rails, then proceed from there.
Like cracking passwords / encryption and injecting itself into anything and everything that connects to the internet?
How else is AI supposed to grow? It’s supposed to observe everything in existence.
Noted!
Just learned something new. Thanks!
I just tested it… it’s the same combination for a fast shutdown. Up > Down > Hold Power (1 second hold), then you’re introduced to the option of sliding to power off. If you exit from that prompt or just leave the screen idle for about 10-15 seconds (I didn’t count it) you’ll be forced to enter passcode.
Legit.
I forgot my passcode.
What then?
Wow… thanks for your input! I appreciate it.
I know how you feel, OP. Regarding data collection; right before I was about to buy a, “Robot Vacuum”, I decided to check the security side of things. I learned that some of these vacuums have a camera, for navigation purposes supposedly, and that camera can save everything it captures and send it up to a server. So I’ve put that purchase on pause for now… I need to further investigate what product I can purchase that does not have a built in camera. I can manage the connections it makes to the internet if it needs to of course through something like pi-hole.
The masters that be are conditioning us for the vision of WEF. Own nothing, be happy.
WTF… When did employers start reporting our income into a national/international database for other employers to view? Is it even mentioned in our contracts with the employer?