Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)I
Posts
8
Comments
137
Joined
2 yr. ago

  • I’ve never had an account with these. Do I need to create an account with them to freeze my credits? And what kinds of information should I give / not give when I do?

  • thanks for clarifying! that’s really helpful!

  • haha nice. I’ll try that next time

  • gotcha, thanks for clarifying :)

  • “NOPE” as in “not a dark pattern” or as in “I’m not touching this site”? if former, can you clarify on the reason?

  • can you clarify on the 7?

  • thanks for confirming my suspicion. as for your question, conda in general is good for installing non-python binaries when needed, and managing env. I don’t use anaconda but it provides a good enough interface for beginners and folks without much coding experience. It’s usually the easiest to use that than other variants for them, or the python route of setting up environments

  • Privacy @lemmy.ml

    Is anaconda download page considered dark pattern?

  • If you’ve never worked before, this can be considered practice runs for the when you do.

    Like one of the other commentors said, assume everything is accessible by Google and/or your university (and later, your boss, company, organization, …).

    And not just you, but the people who interact with you through it. So that means you may be able to put up defenses, but if they don’t (and they most likely do not), the data that you interact with them would likely be accessible as well.

    So here are some potential suggestions to minimize private-data access by Google/university while still being able to work with others (adjust things depending on your threat model of course):

    • use Google Workspace services only for collaboration and for official business communication
    • don’t link things that may be personal, such as Google Map, Youtube, Search history, Browser, …
    • if more sensitive things need to be shared with other people, use more private/encrypted solutions that you like or the university suggests. You should use the latter if it’s still “business”-related, e.g. communicate about medical research data with PII
    • if there are communications that need sensitive information (eg HR documents, tax documents), ask them (a) if you can bring the sensitive documents to them, (b) or if the university has an encrypted solution, or (c) if you can use your own encrypted solution (eg put files on protondrive and you give them the appropriate folder password in person)
    • go through all Google privacy and security settings every 6 months or so, and turn off what you don’t need (there are usually a bunch of guides for that). Note: every 6 months because there may be new stuff that they add
    • turn off all the AI integrated features (sometimes called smart features) in Google services like Mail, GDoc, …
    • avoid using GDrive for storage of personal files - if you need to, try to encrypt them before uploading
    • you may find there are other people like you; and if you work with them, try to ask whether they are comfortable with alternatives or if they have anything suggestions. However, this is usually rare in most fields, so keep your expectations low for this
    • use the multi-account containers in Firefox to containerize all stuff related to university account in one container. Don’t use Google Chrome; if you must you Chromium, there are other “forks?” that you can try
    • use UBlock Origin and block unnecessary Google services (you’ll have to play around with this a lot)
    • avoid clicking on links in emails if possible, but instead copy them by selecting them (or the right click, copy). This is an unfounded suspicion, Google may track what links you click on
  • sounds like this can be a plot of a new Pixar movie

  • cuts parts

    that’s actually what the underlying method does, as this is extractive summary, hence it mostly cuts and stitches things.

    From my naive understanding, this type of method does not use or “understand” context.

    The alternative is abstractive summary, which is where LLMs (or even small/medium language models) are good for. But I suspect that would be a controversial choice on lemmy.

  • Lol ads that can be engineered into DNA, so that they can be passed down for generations.

  • Based on this reddit comment, that website is not affiliated with the magic-wormhole CLI tool

  • hm, I think I’ve been doing it wrong then …

  • someone should make an alternate history tv show where the ship made it. bonus if it’s of a parody kind.

  • doesn’t seem to be so comfortable with glasses, esp with a hoodie unfortunately

  • ah gotcha, you meant ISP-provided devices

  • never turn on ISP-supplied WiFi

    maybe I’m missing something here, how do you get access to the internet for all devices (mobiles, laptops, …) without wifi then?

  • Backend of this is OpenAI / LLM; so my guess is if OP knows what they want, they can prompt such models or chatbots in such a manner to achieve the desired styles.

  • Do we know whether federated content (say from Lemmy or Mastodon) with these sites may be under the deal as well?

  • Selfhosted @lemmy.world

    Selfhosted “plagiarism” checker with custom sources?

  • Selfhosted @lemmy.world

    Suggestion for Airtable alternative with mobile options?

  • Movies and TV Shows @lemmy.film

    Anyone here watched Warrior S3 finale?

  • Ask Lemmy @lemmy.world

    Is it possible to have Wikipedia sources in a cycle?

  • Asklemmy @lemmy.ml

    Does discuss/discourse have federation?

  • No Stupid Questions @lemmy.world

    Is there a day of any given year that is least special?

  • Selfhosted @lemmy.world

    Comment systems for static pages (Jekyll)?