Found 1 bookmarks
Newest
The Dawn of Mediocre Computing
The Dawn of Mediocre Computing
I’ll take an inventory in a future post, but here’s one as a sample: AIs can be used to generate “deep fakes” while cryptographic techniques can be used to reliably authenticate things against such fakery. Flipping it around, crypto is a target-rich environment for scammers and hackers, and machine learning can be used to audit crypto code for vulnerabilities. I am convinced there is something deeper going on here. This reeks of real yin-yangery that extends to the roots of computing somehow.
·studio.ribbonfarm.com·
The Dawn of Mediocre Computing