this post was submitted on 17 Jun 2024
135 points (100.0% liked)

Technology

37720 readers
35 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] PeterBronez@hachyderm.io 2 points 4 months ago (1 children)

@along_the_road what’s the alternative scenario here?

You could push to remove some public information from common crawl. How do you identify what public data is _unintentionally_ public?

Assume we solve that problem. Now the open datasets and models developed on them are weaker. They’re specifically weaker at identifying children as things that exist in the world. Do we want that? What if it reduces the performance of cars’ emergency breaking systems? CSAM filters? Family photo organization?

[–] kent_eh@lemmy.ca 1 points 4 months ago (1 children)

what’s the alternative scenario here?

Parents could not upload pictures of their kids everywhere in a vain attempt to attract attention to themselves?

That would be good.

[–] PeterBronez@hachyderm.io 1 points 4 months ago

@kent_eh exactly.

The alternative is “if you want your content to be private, share it privately.”

If you transmit your content to anyone who sends you a GET request, you lose control of that content. The recipient has the bits.

It would be nice to extend the core technology to better reflect your intent. Perhaps embedding license metadata in the images, the way LICENSE.txt travels with source code. That’s still quite weak, as we saw with Do Not Track.