

Dang I wish did more with the Mimic3 project. They have SSML support which just seems like an awesome way to address the mono voice issue in tts for books to me.
Dang I wish did more with the Mimic3 project. They have SSML support which just seems like an awesome way to address the mono voice issue in tts for books to me.
Adding evidence not an answer. Its wild to me when it predicts my Duolingo lesson words to me. Like that anomaly is just wild to me
I’m commenting via Tor now. It’s not that bad
I think you can point to a file instead too
“Hey I’m going to buy your location data tonight.”
“I like to know where you go on Thursdays”
This what Google, Facebook, X, your ISP, and the junk apps on your phone actually get from you, and everyone around you when you use their creepy apps.
Hit me up on Mastadon, use Tor, use DDG, we should have an restraining order against these creeps. Worse yet they don’t just want it for themselves they sell and share it with company, countries, anyone they like, and don’t tell you.
This is how I WANT to talk about because it’s how I feel. Their just strangers, I wouldn’t tell a stranger on the street any of this. I feel like this is such a fringe thought for people though.
Right. It’s the difference between I’ve been to Holland and I’ve lived in Springfield Missouri and I am at Holland right now and my house in Missouri is currently unoccupied and full of valuables.
Time of info can make a heck of a difference
Privacy is a foundational right. Without it inviduals suffer from the imbalanced power dynamic of the states resources.
And they should be held liable for the costs occurred to employees and customers.
Then companies deserved to be hacked. shrug
From the article: “Even knowing that Kamkar’s silent, invisible, long-distance laser spy trick exists, how does anyone hide their secrets from it? He suggests that companies install double-paned or reflective glass. Some security device companies also sell protection devices that affix to windows and vibrate them to prevent laser microphone spying, and Kamkar concedes he hasn’t tested his attack against those. But he also suggests a safer countermeasure: “Don’t work on computers visible from a window,” he says. “Or just have dirty windows.””
Hey that’s what I did with Mimic2 (the Mycroft project’s TTS) and DeepSpeach (Mozilla’s STT) for a Lil bit. Hard to handle streaming data right, but it was doableish.
Yes. It is.
Any system with this level of access to the system should be opensource and tested against actual workloads before shipping updates to prod.
Something like ebpf would make more sense too.
The perspective of the image is voyeuristic. The person criticing the trend is talking about that issue.
This isn’t even an image of lesbian teen romance tbh. Its penned for the viewers interest instead of candid scene of two kids in love
That is not ok either. Children adult sexual or romantic relationships are not ok because of the power dynamic. Both of legal rights and emotional and mental maturities.
As a citizen of the world its because they are slavers and fuck slavery. One of the biggest lobbiest against fighting slavery too.
Having been friends and family IT though its because they suck. They suck to work on. They suck to devolop for. They suck to run server stuff on. They suck to game on. And they cost an arm and leg for the privilege.
Use a Foss client that blocks the client tracking aspects, tor to connect, and only post pgp encrypted messages on it?
Is narcissistic disorder a prereq to be a billionaire or is it just a common symptom of having too much wealth for some.
Matrix is still in my “recommend” category for real time federation. With third room still being the coolest example of what that can mean so far. They build on the same libs that make Peertube work too for the video sharing aspect (not the video metadata sharing and socials that all ActivityPub).
I’m really excited to see dendrite make it to client devices for real p2p servers, maybe even as a micro service deployment. I do want to try out the Conduwuit too.
That said the metadata leakage is an issue to me and consider that a serious flaw depending on your threat model, and you want to extra steps to preserve your identity from an untrusted matrix network and/or stick to a private one you trust