That’s true. There could be a balance of sorts. Who knows. If LLMs become increasingly useful, people start using them more. As they loose training data, quality goes down, and people shift back to forums etc. Could work that way too.
chaosCruiser
Based on her expression I can imagine what must have been going on in her head at the time.
“[Sigh] Another human. Can you like.. scurry along already, or whatever it is that you humans do. I’ve had enough of you as it is.”
People should really start demanding more sensible terms. Currently, people just don’t care, and companies are taking full advantage of the situation.
"Some years ago, I provided my phone number to Google as part of an identity verification process, but didn’t consent to it being shared publicly."
That may have been the case at the time, but Google have a bad habit of updating legal documents and settings from time to time. Even if you didn't consent to it directly, you may have agreed to a contract you didn't read, which resulted in Google doing everything permitted in that contract. Chances are, the contract says that Google can legally screw around as much as they like, and you're powerless to do anything about it.
What doesn’t kill you, cripple you for life or leave mental scars, might make you stronger. Chances are, it will make you weaker.
Based on the numbers from Purism, it could be a lot more than 25% more expensive to manufacture everything in USA. Purims Librem 5 costs 799 $, while the made-in-America version costs 1999 $. That's roughly a 2.5x difference. Obviously, economies of scale play a role too but let's assume that the same factor applies to iPhones too. If so, the fanciest iPhone would cost about 4000 $.
The Hacker and the Honeypot
Zero, a notoriously ambitious hacker, had set his sights on a particular server. Rumors swirled in the dark corners of the internet that this server held a treasure trove: a database brimming with user accounts and password hashes. For Zero, breaching it would solidify his legend.
He spent days, then weeks, launching every exploit he knew. He tried SQL injections, brute-force attacks, phishing attempts, and probing for every conceivable vulnerability. Each time, the server remained unyielding, its digital defenses ironclad. Zero’s fingers flew across his keyboard, lines of code blurring on his multiple screens, but the coveted data remained tantalizingly out of reach.
Frustration mounted. Sleep became a luxury, and the thrill of the chase turned into a gnawing obsession. Yet, despite his relentless efforts and advanced tools, the server simply wouldn't yield its secrets.
Finally, after one last, exhaustive attempt failed, Zero leaned back in his chair, a bitter laugh escaping him. "Forget it," he muttered to his empty room, "that server is a honeypot anyway! Just a decoy set up to waste a hacker's time. There's probably no real data on it at all."
Oh, and the lesson. Almost forgot. Err... Don't be a noob, don't trust everything you read online, know what you're hacking... oh bugger this post is going off the rails. I'm sure there's a good lesson somewhere in there. Buried deep...
And they are federated with each other, and defederated with all other instances.
Good catch. I screwed up the zeros. Fixed it now.
That’s exactly what I’m worried about happening. What If one day there are hardly any sources left?