[-] gwindli@lemy.lol 1 points 1 month ago

i have an old flsun super racer delta printer that i really like. it's about 5 or 6 years old now, but it still cruises along like a champ. only drawback is that deltas are tall machines by comparison to other printers.

[-] gwindli@lemy.lol 4 points 1 month ago

the best practice is to keep your dhcp pool and reservations from overlapping, but on a home network its usually easier to let a device acquire an ip via dhcp and then create the reservation for that address.

[-] gwindli@lemy.lol 1 points 3 months ago

its not even about spotting AI images being passed off as real. it isn't hard to simply seek out AI generated content when i want to look at it and avoid it when i don't. you make it sound like it's impossible to make choices about what content to consume, or that everyone is out there trying to pass off AIgen as real to the point where you can't trust anything any more. we're heading in that direction but we're not there yet.

[-] gwindli@lemy.lol 1 points 3 months ago

and by the same logic, you cant know if i have or have not been duped by an AI image. thanks for asserting expert knowledge of my perceptionsl capabilities, but you'll understand that i am extremely skeptical of that assertion. based on how i consume media, the likelihood that i have been exposed to AI generated images without my knowledge is pretty low. but do continue to tell me what my experience of the world is .. its kinda hilarious

[-] gwindli@lemy.lol 4 points 3 months ago

i suppose i cant disagree with the premise... but to clarify, the AI is equivalent to a paint brush or phototshop... a tool used by the prompter to create (extremely derivative and hacky) artworks. i have seen a lot of very expressive works generated by AI, where a concept thought up by the prompter is expressed to humorous or sometimes grim results. but every AI image i have seen has tells of being AI generated.

[-] gwindli@lemy.lol 1 points 4 months ago

fair enough. i can see that disabling safe mode would be a decent security measure. but by the time that kind of exploit is used, you've already got bad actors inside your network and there are much easier methods available to pivot to other devices and accounts.

view more: ‹ prev next ›

gwindli

joined 9 months ago