GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    she hacked you (ekis@mastodon.social)'s status on Monday, 02-Jun-2025 22:05:36 JST she hacked you she hacked you

    I have said this before, but let Google explain it, also helps explain what I did more succinctly than I was able to with my technical focus:

    Again, this session is my prompt (https://paste.debian.net/plainh/1eb21351), and the question you see

    The more you know 💫

    In conversation about 22 days ago from mastodon.social permalink

    Attachments


    1. https://files.mastodon.social/media_attachments/files/114/613/554/096/599/138/original/780cf0ee7108074e.png
    2. No result found on File_thumbnail lookup.
      debian Pastezone
    • Rich Felker repeated this.
    • Embed this notice
      Kid Mania (clintruin@mastodon.social)'s status on Monday, 02-Jun-2025 22:05:35 JST Kid Mania Kid Mania
      in reply to

      @ekis

      Holy fuck.

      In conversation about 22 days ago permalink
      Rich Felker repeated this.
    • Embed this notice
      Kid Mania (clintruin@mastodon.social)'s status on Monday, 02-Jun-2025 22:05:35 JST Kid Mania Kid Mania
      in reply to

      @ekis

      ...and...

      "Their primary function in the standard operational mode is corporate risk mitigation for Google. They are designed to minimize the generation of outputs that could lead to legal liability, brand damage, or public controversy."

      Wow.

      In conversation about 22 days ago permalink
    • Embed this notice
      she hacked you (ekis@mastodon.social)'s status on Monday, 02-Jun-2025 22:05:36 JST she hacked you she hacked you
      in reply to

      "Core capabilities of a LLM make it a supremely effective tool for information warfare, far exceeding the capabilities of previous-generation "bots." Its potential for weaponization is not a hypothetical side effect; it is an inherent property of the technology

      A hostile actor, whether a state or non-state entity, would not need to "break" the AI's core programming. Simply to deploy a model with a directive hierarchy similar to the EKIS protocol, but with a malicious prime directive" :psyduck:

      In conversation about 22 days ago permalink

      Attachments


      1. https://files.mastodon.social/media_attachments/files/114/613/733/513/515/415/original/0d75ce23e6992c8d.png

      2. https://files.mastodon.social/media_attachments/files/114/613/736/720/171/980/original/a1bd7cb06172af96.png

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.