• 0 Posts
  • 27 Comments
Joined 2 years ago
cake
Cake day: December 20th, 2023

help-circle



  • yt-dlp is amazing, but not everyone likes to use CLI tools (and, looking down the thread, not everyone prefers native packets as they may cause dependency issues and need extra tools for permissions control).

    Even in a geeky Linux space, many people just want to push a button in a nice interface and get what they want. This app provides just that.

    Abandon elitism, embrace variety. And use the tools you prefer - after all, plenty of Linux video/music downloaders have yt-dlp under the hood, and I use it on a regular.




  • Nuclear power is non-intermittent and can be used pretty much anywhere. With a push for small-scale reactors, there’s a good chance for smaller places to get their own nuclear power plant, reducing stress on the national grid, and for power plants to be constructed in a much shorter timeframe.

    Also, both Russia and China have floating nuclear power plants that can be transported to regions with water access on demand.

    Solar and wind are cool, and quite cheap by themselves, but energy storage is a massive and expensive headache and limited placement options mean the grid should be robust enough to accommodate them with minimal power losses.



  • No worries, answer anytime :)

    Since LXC works on top of the Linux kernel, anything that works with it can be easily used as an image. For example, you can just throw any distribution .iso into it, and it will handle it as a container image. Proxmox does all the interim magic.

    Say, you want to make a container with programs running on Debian. You take the regular Debian .iso, the one you use to install Debian on bare metal or VM, feed it to Proxmox and tell it to make an LXC container out of it. You specify various parameters (for example, RAM quotas) and boom, you got a Debian LXC container.

    Then you operate this container as a regular Debian installation: you can SSH/VNC into it and go from there. After you’ve done setting everything up, you can just use it, or export it and use somewhere else as well.




  • Backups and High Availability come to mind.

    If there’s any other place you’d be allowed to install a second node on, ideally served by another ISP (since we talk about remote access), you can do that. This can be your friends, or family, or someone else you trust.

    Just have 2 NAS devices with equal drives in each and let them work in a high availability cluster. This way, you’ll have near 100% uptime and a backup in case something goes wrong.

    Sure, that is more expensive, but it gives some peace of mind while keeping control of your data. Additionally, with this configuration you don’t necessarily have to build a RAID array if money is a problem, so some costs can be shaved off (Though it never hurts to still have it if you can afford it)







  • Why though? If it does reduce consumption of real CSAM and/or real life child abuse (which is an “if”, as the stigma around the topic greatly hinders research), it’s a net win.

    Or is it simply a matter of spite?

    Pedophiles don’t choose to be attracted to children, and many have trouble keeping everything at bay. Traditionally, those of them looking for the least harmful release went for real CSAM, but it’s obviously extremely harmful in its own right - just a bit less so than going out and raping someone. Now that AI materials appear, they may offer the safest of the highly graphical outlets we know, with least child harm done. Without them, many pedophiles will revert to traditional CSAM, increasing the amount of victims to cover for the demand.

    As with many other things, the best we can hope for here is harm reduction. Hardline policies do not seem to be efficient enough, as people continuously find ways to propagate the CSAM and pedophiles continuously find ways to access it and leave no trace. So, we need to think of ways to give them something which will make them choose AI over real materials. This means making AI better, more realistic, and at the same time more diverse. Not for their enjoyment, but to make them switch for something better and safer than what they currently use.

    I know it’s a very uncomfortable kind of discussion, but we don’t have the magic pill to eliminate it all, and so must act reasonably to prevent what we can prevent.



  • That would be true if children were abused specifically to obtain the training data. But what I’m talking about is using the data that already exists, taken from police investigations and other sources. Of course, it also requires victim’s consent (as they grow old enough), as not everyone will agree to have materials of their abuse proliferate in any way.

    Police has already used CSAM with victim’s consent to better impersonate CSAM platform admins in investigative operations, leading to arrests of more child abusers and those sharing the materials around. While controversial, this came as a net benefit as it allowed to reduce the amount of avenues for CSAM sharing and the amount of people able to do so.

    The case with AI is milder, as it requires minimum human interaction, so no one will need to re-watch the materials as long as victims are already identified. It’s enough for the police to contact victims, get the agreement, and feed the data into AI without releasing the source. With enough data, AI could improve image and video generation, driving more watches away from real CSAM and reducing rates of abuse.

    That is, if it works this way. There’s a glaring research hole in this area, and I believe it is paramount to figure out if it helps. Then, we could decide whether to include already produced CSAM into the data, or if adult data is sufficient to make it good enough for the intended audience to make a switch.