Hi @eden
Did you have a chance to read the message @francommit sent you?
Franco asked you what you used to get the statistics data
reshared this
Hi @eden
Did you have a chance to read the message @francommit sent you?
Franco asked you what you used to get the statistics data
reshared this
Der durchdigitalisierte Staat soll her und das möglichst schnell. Darin sind sich Bund und Länder nach der Digitalministerkonferenz einig. Um Tempo zu machen, wollen die zuständigen Minister:innen mehr sogenannte Künstliche Intelligenz und weniger Datenschutz.
reshared this
Dieci persone arrestate con l’accusa di aver consultato illegalmente le banche dati dello stato e rivenduto i loro contenuti
La procura di Napoli ha richiesto l’arresto di 10 persone accusate di essere coinvolte in un articolato sistema per la vendita di dati ottenuti consultando illegalmente le banche dati della polizia, dell’INPS, dell’Agenzia delle entrate e delle Poste. I dati venivano venduti ad agenzie di investigazione privata in tutta Italia.
reshared this
Digitalministerkonferenz: Wildberger will Datenschutz für KI-Einsatz in der Verwaltung schleifen
ApocalypseZ: come gli hacker russi automatizzano il furto di account Signal su scala industriale
#CyberSecurity
insicurezzadigitale.com/apocal…
reshared this
Fortinet has disclosed CVE-2026-26083, a critical (CVSS 9.1) missing-authorization vulnerability in FortiSandbox that lets unauthenticated attackers execute arbitrary code remotely across on-prem, cloud, and PaaS deployments.dark6 (Secure Bulletin)
reshared this
Attackers compromised 84 npm artifacts across 42 TanStack packages — including react-router with 12M+ weekly downloads — injecting a credential-stealing payload via chained GitHub Actions abuse.dark6 (Secure Bulletin)
reshared this
A maximum-severity (CVSS 10.0) vulnerability in the SandboxJS npm library allows attackers to completely escape the JavaScript sandbox and execute arbitrary code on the host system — no credentials or user interaction required.dark6 (Secure Bulletin)
reshared this
A publicly released tool called BitUnlocker demonstrates a practical downgrade attack against BitLocker on fully-patched Windows 11 machines, exploiting a gap between CVE-2025-48804 patching and certificate revocation to decrypt protected volumes in …dark6 (Secure Bulletin)
reshared this
Centralized energy intermediaries don't secure power: they profile habits and raise barriers.
Energy Communities reverse this: prosumers share value internally, protected by encryption. No external exposure. No surveillance creep.
🔗 news.dyne.org/renewable-sustai…
Grid management is not just a technical challenge. Energy autonomy is a relational and local dimension, rooted in specific contexts.Alex D'Elia (News From Dyne)
reshared this
@politics
europeanpirates.eu/when-privac…
Etiquette says, “reading personal messages not addressed to you is improper and impolite.” But
Etiquette says, “reading personal messages not addressed to you is improper and impolite.” But Meta’s decision to discontinue End-to-End Encryption for Instagram private and direct messages on 8th May 2026 raises concerns about crossing that line.
If this issue were only about personal behavior, the results would be straightforward: lost trust, public backlash, and maybe some new rules to remind us that privacy is important. But when a major company like Meta changes the meaning of private communication, the impact is much greater. Now, governments, advertisers, businesses, activists, journalists, and billions of users all face the same question:
Who gets access to our conversations, and at what cost?
End-to-End Encryption (E2EE) – a security feature that makes sure only the sender and recipient can read messages. No one else – not governments, law enforcement, hackers, or even the platform itself can access them.
Today, personal data is extremely valuable, so encryption is less of a luxury and more like a digital lock on your front door.
Meta still uses end-to-end encryption on WhatsApp, so even the company cannot read those conversations. But now, Meta has chosen to remove this protection from Instagram direct messages.
For many privacy advocates, the move feels like a mailman opening confidential envelopes before they reach their destinations. And not just reading them, but also deciding which messages deserve attention, which appear suspicious, and whether they should reach the recipient at all.
The concern is not merely about discomfort. It is about power: who holds it, how much access they possess, and how easily the boundaries of privacy can shift once surveillance becomes normalized.
To understand the debate, it’s important to know that Meta’s decision did not happen on its own.
The company has argued that very few users were actively opting into encrypted direct messaging features. According to a Meta spokesperson:
“Very few people were opting in to end-to-end encrypted messaging in DMs. Anyone who wants to keep messaging with end-to-end encryption can easily do that on WhatsApp.”
At the same time, Meta continues to face mounting scrutiny regarding child safety on its platforms.
In a lawsuit brought by New Mexico Attorney General Raúl Torrez, Meta was accused of failing to adequately protect users on Instagram and Facebook from online predators while continuing to portray its platforms as safer than they actually were.
The case raised more concerns. Internal records showed that employees knew stronger encryption on Messenger could make it much harder to report almost 7.5 million child sexual abuse material (CSAM) cases.
Because of these concerns, especially about child safety, some people see Meta’s decision as a needed step to better spot harmful content, scams, and abuse before it spreads on the platform.
For many people, especially parents and safety advocates, these concerns cannot simply be dismissed.
While Meta has defended its decision on safety and moderation grounds, digital-rights groups argue that the implications extend far beyond platform management.
One of the strongest objections raised by privacy advocates is the removal of a fundamental layer of digital protection.
Without E2EE, Meta can access direct messages, including texts, images, videos, and voice notes. Critics say this changes the meaning of private communication online. For activists, journalists, whistleblowers, and people in restrictive countries, encryption is not just a feature—it’s protection from surveillance and misuse of their information.
Cybersecurity experts and privacy groups have repeatedly warned that weakening encryption protections creates broader vulnerabilities across digital systems.
The concern isn’t just about Meta reading messages. Critics say that once secure systems are opened up, the risks of data breaches, hacking, and misuse go up. Many believe there’s no such thing as a truly safe backdoor into encrypted systems.
Another major criticism centers around Meta’s commercial incentives.
Critics say that easier access to private messages could help Meta improve targeted ads and train AI models. Since private conversations hold a lot of personal and emotional information, this raises ethical questions about whether our messages should be used for profit.
Activists also question Meta’s claim about “low adoption” of encrypted features like Secret Conversations. They argue that these features were hard to find and hidden in menus, so low usage was more about design than lack of interest.
Privacy advocates also fear that Meta’s decision could influence broader industry behavior.
Meta is one of the world’s biggest tech companies, and other platforms often follow its lead. Critics worry that if Meta weakens encryption, it could make lower security standards normal across social media.
For digital-rights defenders, this is not merely a platform-specific policy change. It could become a turning point for the future of online private communication.
Child safety organizations and some policymakers have welcomed Meta’s move, arguing that End-to-End Encryption can make it harder to detect abusive networks and harmful content.
However, privacy advocates say that removing encryption doesn’t eliminate threats to vulnerable users. Instead, it takes away protection from everyone and puts more pressure on victims to spot and report abuse themselves.
Critics also warn that surveillance systems introduced in the name of safety can gradually expand beyond their original purpose if sufficient safeguards and accountability are absent.
For many critics, the decision also represents a major credibility issue.
In 2019, Mark Zuckerberg publicly stated that “the future is private,” signaling a broader shift toward secure and encrypted communication across Meta’s platforms.
The current rollback is therefore being viewed by many digital-rights advocates as a direct contradiction of that earlier promise.
As part of a collective redress, several digital-rights organizations and civil society groups have publicly opposed Meta’s decision through a coalition led by the Global Encryption Coalition. Member groups include European Digital Rights, Mozilla, Global Partners Digital, Internet Society, and Internet Freedom Foundation.
Their deepest concern is not just the immediate policy change, but the cultural shift it represents.
Over the last decade, people have gradually become accustomed to trading privacy for convenience. Location tracking, targeted advertising, algorithmic profiling, and facial recognition systems all entered public life slowly enough to feel almost inevitable. Critics fear encryption could be next.
If societies begin accepting the idea that private communication must always remain accessible to monitoring or inspection, privacy itself slowly ceases to be treated as a right and becomes a suspicious privilege.
The fear of always being watched could have lasting effects on free speech, democracy, and independent journalism. Many privacy advocates say that the idea of “nothing to fear if nothing wrong has been committed” misses the point because it treats privacy as secrecy instead of a basic right.
The debate between safety and privacy remains deeply complex. Concerns raised by parents, safety advocates, and law enforcement agencies cannot simply be brushed aside. Preventing abuse, scams, and harmful content is an important responsibility for digital platforms and society at large.
At the same time, users increasingly fear a future where private conversations are no longer truly private. This tension has pushed researchers, cybersecurity experts, and policymakers to explore possible middle-ground solutions where safety measures can coexist with stronger privacy protections.
Some methods, such as client-side scanning, try to detect harmful material before messages are encrypted. Other approaches, such as differential privacy, federated learning, and privacy-preserving computation, aim to make safety systems better without exposing personal data.
However, digital-rights advocates remain cautious. Critics argue that even privacy-focused monitoring systems can gradually evolve into broader surveillance mechanisms in the absence of strong safeguards and accountability. The concern is not just whether these technologies function effectively, but who controls them and how their powers may expand over time.
People rarely think about the importance of encryption until it begins to disappear.
Imagine living in a world where someone could hear your inner thoughts without permission. At first, such a power might seem fascinating. But over time, the freedom to think, question, disagree, or express yourself honestly would begin shrinking under the fear of constant observation.
Privacy functions similarly.
The current debate surrounding Meta is therefore broader than a single company or a single policy decision. It reflects a broader struggle over what kind of internet we are collectively building: one centered on user rights and democratic freedoms, or one increasingly shaped by surveillance, control, and data access.
The outcome could shape not only the future of online communication, but also the limits of digital freedom itself.
Is merely knowing how the digital world is changing enough? Is awareness of our rights to privacy, expression, and opinion sufficient to protect them? Does the responsibility of a digitally aware citizen end at simply observing how digital policies shape our online lives?
If the answer is NO, then it is time to act.
Join European Pirates in defending an internet where security does not come at the cost of freedom and privacy.
Parisi, con oligarchi dell'IA a rischio l'accesso alla conoscenza
Gruppo 2003, difendere l'autonomia della ricerca per difendere la libertà della società
L'intelligenza artificiale va regolamentata prima che si affermino forme di oligopolio, o persino di monopolio, capaci controllare l'accesso alle informazioni e la produzione di nuove conoscenze: per questo serve un grande centro di ricerca pubblico …Agenzia ANSA
reshared this
Uno studio rivela che i tagli al programma DOGE hanno scatenato un'ondata mortale di violenza in tutta l'Africa.
Lo smantellamento dell'Agenzia degli Stati Uniti per lo Sviluppo Internazionale (USAID) è associato a incrementi misurabili in Africa, soprattutto nelle aree più dipendenti dal sostegno dell'agenzia.
reshared this
SimpleChat: un template Blazor provider-agnostico per chat AI con .NET 10 Aspire
#tech
spcnet.it/simplechat-un-templa…
@informatica
reshared this
LINQ in C#: guida completa alle operazioni di aggregazione (Count, Sum, MinBy, MaxBy, Aggregate)
#tech
spcnet.it/linq-in-c-guida-comp…
@informatica
reshared this
FamousSparrow nel Caucaso: tre ondate di spionaggio cinese colpiscono il gas azero che alimenta l’Europa
#CyberSecurity
insicurezzadigitale.com/famous…
reshared this
A new ClickFix campaign observed by ReliaQuest pairs the social engineering technique with PySoxy, a 10-year-old Python SOCKS5 proxy, creating a two-channel persistent access chain that continues operating even after endpoint security blocks the init…dark6 (Secure Bulletin)
reshared this
A critical use-after-free vulnerability in Exim mail servers (versions 4.97–4.99.2 with GnuTLS) allows unauthenticated remote attackers to corrupt heap memory and potentially execute arbitrary code. Patch to version 4.99.3 immediately.dark6 (Secure Bulletin)
reshared this
Microsoft has patched CVE-2026-32185, a spoofing vulnerability in Microsoft Teams for Android that allows local attackers to impersonate trusted devices or content.dark6 (Secure Bulletin)
reshared this
@politics
europeanpirates.eu/solidarity-…
Our Hungarian observer member MKKP (Hungarian Two-tailed Dog Party) campaigned to run for the last Parliamentary elections the 12th of April. MKKP members and candidates continue to be adamant to build a better
Our Hungarian observer member MKKP (Hungarian Two-tailed Dog Party) campaigned to run for the last Parliamentary elections the 12th of April. Despite their efforts and their previous elections’ results (2,6% in the 2019 European elections and 3,2% in 2022 national parliamentary elections) they have unfortunately not reached 1% of the votes. While any loss in elections is disappointing for the people behind any political party, not reaching 1% is particularly important for the Hungarian political context.
When running for elections, Hungarian political parties are given a budget for their political campaigns and infrastructure. Importantly, the law also states that in case of not reaching the threshold established, the party has to give back that budget.
While the law exist with the purpose of guaranteeing better transparency for non-legitimate parties, the consequence of such conditionality means that many people might decide not to run for elections in order to avoid such risk. Even though the fund availability for campaigning that the Hungarian law provides is extremely welcomed and needed, it has an unintended chilling effect for political people that would like to be more engaged in politics.
We are proud that MKKP continued their political work and run for this elections. However, given the results, that means that now they are expected to pay back over 1,7 million Euros(686 million forints) for campaign funding.
That is still unclear. The law has conditional phrasing and there’s no previous record of how this could look like. But there is the possibility that the soon-to-be-made resolution will give the MKKP 15 days to pay the amount into the State treasury. At the moment, MKKP is still waiting for a formal notice.
What is clear, however, is that even if the political party would have all the intention to comply with such notice, they do not have the resources to do so. Which is why they are running a crowdfunding campaign to collect the money they would owe. So far, MKKP has managed to collect 20% of the amount- which is a good start, but not nearly enough.
Unfortunately, if they don’t manage to crowdfund the amount, this might fall on the shoulders of the individual candidates.
European Pirates are in contact with our member’s candidates, and the people working behind the scenes, and are incredibly proud of their resilience. MKKP members and candidates continue to be adamant to build a better Hungary. Whether this is through MKKP or by funding a new party- their political work is not over.
We stand in support with our member and we hope for the best course of action so that they can continue building a better Hungary.
Foxconn has confirmed a ransomware attack on its North American factories after the Nitrogen gang claimed to have stolen 8TB of data including technical drawings and network topology maps tied to AMD, Intel, and Google projects.dark6 (Secure Bulletin)
reshared this
re:publica 26: Dagegenhalten für ein besseres Morgen
Nächste Woche findet die re:publica statt, die größte Konferenz für die digitale Gesellschaft in Europa. Das Programm bietet viele spannende Themen und Formate. Auf den Bühnen stehen auch Redakteur:innen und Autor:innen von netzpolitik.org.
netzpolitik.org/2026/dagegenha…
Nächste Woche findet zum 26. Mal die re:publica statt, die größte Konferenz für die digitale Gesellschaft in Europa. Das Programm bietet viele spannende Themen und Formate. Auf den Bühnen stehen auch Redakteur:innen und Autor:innen von netzpolitik.Daniel Leisegang (netzpolitik.org)
reshared this
GitLab Act 2: il manifesto dell’AI agentica che promette il futuro e inquieta gli sviluppatori
#CyberSecurity
insicurezzadigitale.com/gitlab…
reshared this
♥️Un giudice federale blocca le sanzioni statunitensi contro Francesca Albanese, direttrice generale delle Nazioni Unite♥️
Il giudice distrettuale statunitense Richard Leon di Washington ha affermato che l'amministrazione Trump ha cercato di regolamentare la libertà di parola di Francesca Albanese a causa dell'"idea o del messaggio espresso".
x.com/i/status/205467873812667…
@news
BREAKING! US court ha suspended the US sanctions against me!As the judge says: "Protecting the Freedom of speech is always just the public interest".Francesca Albanese, UN Special Rapporteur oPt (X (formerly Twitter))
like this
reshared this
Gli oligarchi della repubblica (?) italiana negoziano per offrire i loro cittadini come bersagli per il tiro a segno statunitense, ma lo fanno in segreto.
reshared this
Gli oligarchi dell'Unione Europea negoziano per offrire i loro cittadini come bersagli per il tiro a segno statunitense.
reshared this
Nitrogen ransomware colpisce Foxconn: 8TB di dati con segreti industriali di Apple, Nvidia e Intel
#CyberSecurity
insicurezzadigitale.com/nitrog…
reshared this
Sulla sovranità digitale e perché il cloud europeo è migliore di quanto pensi
"sotto l'esercizio pratico di scambiare uno strumento SaaS con un altro c'era qualcosa che sembrava più urgente, un crescente disagio per quanta parte della mia infrastruttura digitale si trovava su server che non controllavo, in una giurisdizione sempre più incline all'imprevedibilità, gestita da aziende i cui incentivi non sempre sono in linea con i miei."
monokai.com/articles/how-i-mov…
On digital sovereignty, and why European cloud is better than you thinkmonokai.com
reshared this
La hotline olandese per la prevenzione del suicidio condivide i dati dei visitatori con le aziende tecnologiche
La hotline olandese per la prevenzione del suicidio 113 ha condiviso i dati dei visitatori del sito web con terze parti senza consenso, BNR rapporti basato sulla ricerca dell'hacker etico Mick Beer di Hackedemia.nl. Ora Stichting 113 ha temporaneamente sospeso tutti gli strumenti di misurazione e analisi presenti sul suo sito web.
reshared this
CISA has added CVE-2026-32202, a zero-click Windows Shell authentication coercion flaw, to its KEV catalog following confirmed active exploitation by Russia's APT28 group.dark6 (Secure Bulletin)
reshared this
1/ 🥳 Big news for digital rights in Europe: Ireland’s Digital Services Coordinator, Coimisiún na Meán, has opened a formal investigation into Meta’s potential use of “dark patterns” that may prevent people from choosing feeds not based on profiling on Facebook and Instagram.
👏 We’re glad to see regulators taking these concerns seriously. This investigation could become a major step toward meaningful #DSA enforcement and stronger user rights across the EU.
Our reaction ➡️ lnkd.in/euyCMjcA
reshared this
2/ This follows a complaint we filed last year together with @bitsoffreedom, @Freiheitsrechte & Convocation Research+Design on behalf of an 🇮🇪 user. For over a year, civil society organisations have raised concerns that Meta’s design practices undermine people’s freedom to choose how content is recommended to them online.
More information ⤵️
edri.org/our-work/civil-societ…
Civil society organisations are filing a complaint against Meta for violating the Digital Services Act (DSA).EDRi (European Digital Rights (EDRi))
Oblomov reshared this.
A public PoC exploit for CVE-2026-0073 enables any network-local attacker to gain a full ADB shell on unpatched Android 14–16 devices with zero user interaction, exploiting a cryptographic type confusion bug in Android's adbd daemon.dark6 (Secure Bulletin)
reshared this
Die Verwaltungsdigitalisierung ging in den vergangenen Jahren äußerst schleppend voran. Eine Ursache dafür: Die Verwaltung speichert ihr Wissen in Dokumenten ab statt als maschinenlesbare Daten.Esther Menhard (netzpolitik.org)
reshared this
Mythos contro curl: quando l’AI “troppo pericolosa” incontra la realtà del codice
#CyberSecurity
insicurezzadigitale.com/mythos…
reshared this
I’m supporting @bebop , which is a decentralized AGPLv3 e-shop solution : be-bop.io/peerfunding-campaign
One of their current objective is to get 200 stars on github (eeek… github!). If 200 is reached, code of the new connector will be released under AGPLv3.
But, more importantly, each star turns on a flashing beacon on @ludomire and @tirodem desk.
So, if you are still on Github, light-em-up by starring the repo :
github.com/be-BOP-io-SA/be-BOP
And, yes, Bebop support #gnu @Taler !
Marvelous p2p bitcoin-based online sales platform. Contribute to be-BOP-io-SA/be-BOP development by creating an account on GitHub.GitHub
reshared this
@mart_e
Pour le moment be-BOP peut être hébergé par n'importe qui et supporte nativement des méthodes de paiements décentralisées.
L'intégration du protocole Nostr est actuellement assez basique mais l'intégration de nouveaux NIPs rendront notre solution plus compatible avec cet écosystème.
Une intégration d'ActivityPub est aussi souhaité pour l'avenir sur divers points.
On prévoit aussi des choses sympa pour des ventes cross-be-BOP mais c'est de la musique d'avenir.
@mart_e
Si vous n'êtes pas familier avec Nostr je vous recommande cet article (en anglais) de @dyne qui détail bien les différence avec le Fediverse, ses avantages et inconvénients.
news.dyne.org/the-future-was-f…
A dissertation on a journey through the evolution of decentralized social media and the necessity for active, conscious digital citizenship, with all the power and danger that entails.Setto Sakrecoer (News From Dyne)
However awesome, this case is not new. Researchers started to avoid reading the papers they cite (and sometimes write) when statistics replaced reading as a means of evaluating research. Do you remember Ike Antcare (lemonde.fr/series-d-ete/articl…)?
reshared this
Palo Alto Networks is warning of a critical CVE-2026-0300 buffer overflow in PAN-OS Captive Portal that enables unauthenticated root-level remote code execution on PA-Series and VM-Series firewalls.dark6 (Secure Bulletin)
reshared this
funbaker; Je suis Antifa
in reply to netzpolitik.org • • •Buridan's procrastinator ⁂
in reply to funbaker; Je suis Antifa • • •@funbaker +1
Es ist ja nicht so, dass es kein kompetentes Personal im Land gäbe.
Sirana
in reply to Buridan's procrastinator ⁂ • • •@quincy
Leider ist das kompetente Personal inzwischen damit beschäftigt, bei Starbucks Vollzeit Kaffee zu servieren, weil ihnen das inkompetente Personal keinen Spielraum lässt...
@funbaker @netzpolitik_feed
Schlüssellochkind 👁️ reshared this.
funbaker; Je suis Antifa
in reply to Buridan's procrastinator ⁂ • • •funbaker; Je suis Antifa
in reply to funbaker; Je suis Antifa • • •funbaker; Je suis Antifa
in reply to funbaker; Je suis Antifa • • •Buridan's procrastinator ⁂
in reply to funbaker; Je suis Antifa • • •Buridan's procrastinator ⁂
in reply to Buridan's procrastinator ⁂ • • •funbaker; Je suis Antifa
in reply to Buridan's procrastinator ⁂ • • •kichlhuber
in reply to Buridan's procrastinator ⁂ • • •lobingera
in reply to funbaker; Je suis Antifa • • •@funbaker @quincy ich bin nicht 100% sicher, aber einige Dokumente tauchen erst in Elster auf, nachdem du sie angefragt hast (24h später). Die Lohnsteuer auch erst wenn deine Arbeitsstelle sie hochgeladen hat ( meine macht das in der ersten Januarwoche, aber nicht alle).
Elster ist (laut meiner Steuerberatung) immer noch ziemlich viel Handarbeit im Hintergrund
funbaker; Je suis Antifa
in reply to lobingera • • •funbaker; Je suis Antifa
in reply to funbaker; Je suis Antifa • • •funbaker; Je suis Antifa
in reply to funbaker; Je suis Antifa • • •Buridan's procrastinator ⁂
in reply to funbaker; Je suis Antifa • • •Hab zwar einen Elster-Zugang, aber bisher noch die alten Formulare benutzt. Kompliziert ist es auf jeden Fall.
funbaker; Je suis Antifa
in reply to Buridan's procrastinator ⁂ • • •Cyb3rrunn3r
in reply to Buridan's procrastinator ⁂ • • •Sirana
in reply to netzpolitik.org • • •Michael S.
in reply to netzpolitik.org • • •Die Erwartungshaltung an die LLMs zur Lösung aller verschleppten Probleme ist genau überzogen wie die damaligen Heilserwartungen bei der flächendeckenden Einführung der EDV vor einigen Jahrzehnten.
Die sog. generativen KIs sind wunderbare Werkzeuge, aber eben nur das, Werkzeuge. Was damit erreicht wird, bestimmt der menschliche Entscheider dahinter und da bin ich momentan alles andere als optimistisch.
GunWi
in reply to Michael S. • • •Stephan Neuhaus
in reply to netzpolitik.org • • •Moonstone2487
in reply to Stephan Neuhaus • • •- Zu wEnig PRATISCHER, heißt TECHNISCHER Datenschutz, statt bürokratischem / juristischem Blabla
- Digital inkompetenten Rolfs (nix gegen die Rolfs) am Schreibtisch zwischen Röhrenbildschirm, Drucker, Aktenschrank und Faxgerät
- Absoluter Planlosigkeit der Verantwortlichen und den X verschiedenen, untereinander inkompatiblen Systemen der Y Behörden, weil Absprachen untereinander soll ja nich
- Proprietären Dateiformaten
- Behördendeutsch
Florian Lancker
in reply to netzpolitik.org • • •Autodidakt & Analyst Jörg
in reply to Florian Lancker • • •Gegenwind 🇺🇳🖖
in reply to netzpolitik.org • • •Oder jedes Amt muss seine eigene KI bauen
jan Ki | 奇
in reply to Gegenwind 🇺🇳🖖 • • •oder man benutzt einfach gal keine heuristischen Bullshitgeneratoren in der Verwaltung. Wäre für mich die beste Option
RudyF
in reply to netzpolitik.org • • •so und wer kontrolliert dann die KI bevor diese den Status der sog. Super Intelligence erreicht? Tja,
suhrkamp.de/buch/nick-bostrom-…
Superintelligenz. Buch von Nick Bostrom (Suhrkamp Verlag)
Suhrkamp VerlagSchlüssellochkind 👁️
in reply to netzpolitik.org • • •Reimund
in reply to netzpolitik.org • • •@netpolitik_feed@chaos.social
Der Vorsatz "sogenannte" vor "Künstliche Intelligenz" ist unangemessen & albern.
Zur Erinnerung: John McCarthy, der Erfinder des Begriffs, definierte ihn 1955 so:
"Künstliche Intelligenz ist die Fähigkeit einer Maschine, sich in einer Weise zu verhalten, die man als intelligent bezeichnen würde, wenn sich ein Mensch so verhalten würde."
maqy
in reply to netzpolitik.org • • •Isu 🐲
in reply to netzpolitik.org • • •Dass ein MediaMarkt-Ich-bin-doch-nicht-blöd-sondern-sehr-blöd-CEO keine Ahnung von den Anforderungen und Problemen der IT in der Verwaltung hat, war ja abzusehen. Dann aber lieber nur wieder die neueste Hype-Bullshit-Schicht über die bestehenden schlechten Strukturen zu bügeln, sollte in der x-ten Iteration aber selbst SO jemanden als schlechte Idee auffallen.
Dann aber lieber Rechte beschränken, weil der eigene Plan so übergriffig ist. Typisch CEO-Denke. 🤦♂️
Anpa
in reply to netzpolitik.org • • •Bei den Fragen, die zu beantworten sind, weiß ich nicht, ob da nicht das meiste analog läuft.
Echt ätzend
psychoperson
in reply to netzpolitik.org • • •Ryek Darkener
in reply to netzpolitik.org • • •EvilBob
in reply to netzpolitik.org • • •maxmoon 🌱
in reply to netzpolitik.org • • •Niels
in reply to netzpolitik.org • • •Ingrid_DemokratinAusOL
in reply to netzpolitik.org • • •Gaaaanz tolle Idee 🤮🤮🤮
N I C H T
#Datenschutz
#KeinÜberwachungsstaat
#Privatsphäre