Owner and admin of blimps.xyz

I’m a dorky inflatable latex coyote! Linux nerd, baker, some 3D things as I learn. Also love latex. The material, not the typography thing.

Links: https://fursona.directory/@KayOhtie

KeyOxide: openpgp4fpr:134CEDFA7E5546F251394038260773BD8F218384

  • 0 Posts
  • 10 Comments
Joined 3 years ago
cake
Cake day: July 14th, 2023

help-circle

  • Alternatively, it comes off as a person who has tried this in earnest numerous times and is exhausted by people who assume that they haven’t given things a genuine shot.

    And there are few things more grating than a tech person assuming the other person doesn’t know what they are doing in earnest just because they were short with you from having already explained it elsewhere, numerous times over time, to the same result of what is, effectively, tone policing. “You didn’t phrase this in a technical manner thus I assume you know jack shit.” Not far off from sea-lioning really.





  • A text prompt -> audio is not a transformer in the sense of what people are talking about, and you know it or just don’t care, or don’t wholly understand how these systems work under the hood as well.

    What I’m referring to are neural models that take an input audio and are effectively a filter that operates as a neural network. Voice mods, instrument adapters, virtual pedals, amp models… These are all actually transformative. There is actual music and effort going into these. And that is not what Bandcamp is after; those were already in heavy use like 15 years ago.

    The things that generate based on text are a transformer in the most technically correct sense but not in the sense of what is meant when people talk about transformative.

    They’re fundamentally different purposes and usages. It’s not generated vocals from nothing but the lyrics; it’s someone else actually singing it and then a model transforming the sound to match an intended pre-set trained target, not generalization.





  • Signal have published several times when they receive a request for data and their response.

    Due to the mechanisms they employ, all they can actually give is if there’s an account associated with a phone number and the last time it logged in, if even that last bit. There’s some fairly detailed articles diving into how this works so well under the hood from a cryptographic standpoint, but it basically amounts to even addresses of users being able to be secret to minimize shared metadata to a bare minimum.

    Also the software is entirely open-source – app and server both – and are frequently audited on this. The server never has an opportunity to receive any plain-text data to store.

    The weak spot is always just having access to your device.