sister_sam on Nostr: Interesting. So is there any hard proof of this global AI and its capabilities? I am ...
Interesting. So is there any hard proof of this global AI and its capabilities? I am a developer so I know what can be done to a larger degree than most though I can't claim specific expertise. It doesn't take very fancy AI (at least not the modern hotness) to analyze and re-analyze a huge amount of data. But I have questions as to what can and cannot be done with that data especially as it is encrypted coming in except for the normal packet headers. Timing attacks don't seem very efficient if you have thousands of concurrent inputs and outputs. My first thought is at best probabilistic results. And this packet analysis could be done every bit as well at choke points on the general internet. So I am not seeing why going through a particular set of other people's servers makes the danger much larger.
That said going through something that partially by design is a HTTPS MITM is another matter entirely!
Published at
2025-01-25 20:55:42Event JSON
{
"id": "026b00a1f314f6dfe1928cc55215f59e807843ad576a1f2e3b19380f87488a5a",
"pubkey": "e036428bf353ede333c1c50f2b2a472a3bca3e81da632b7367032bf5bf71b7d4",
"created_at": 1737838542,
"kind": 1,
"tags": [
[
"e",
"ecd574eaf873216c7a960770a0527fbfcd6be201518c50b57b551db881ac548f",
"wss://e.nos.lol/",
"root"
],
[
"e",
"c0bb75ea134c380e7abeb8cbef2634598e483004f73dc0c39570ff28fb11f3b4",
"wss://nos.lol/",
"reply",
"ac3f6afe17593f61810513dac9a1e544e87b9ce91b27d37b88ec58fbaa9014aa"
],
[
"p",
"e036428bf353ede333c1c50f2b2a472a3bca3e81da632b7367032bf5bf71b7d4"
],
[
"p",
"ac3f6afe17593f61810513dac9a1e544e87b9ce91b27d37b88ec58fbaa9014aa"
]
],
"content": "Interesting. So is there any hard proof of this global AI and its capabilities? I am a developer so I know what can be done to a larger degree than most though I can't claim specific expertise. It doesn't take very fancy AI (at least not the modern hotness) to analyze and re-analyze a huge amount of data. But I have questions as to what can and cannot be done with that data especially as it is encrypted coming in except for the normal packet headers. Timing attacks don't seem very efficient if you have thousands of concurrent inputs and outputs. My first thought is at best probabilistic results. And this packet analysis could be done every bit as well at choke points on the general internet. So I am not seeing why going through a particular set of other people's servers makes the danger much larger. \n\nThat said going through something that partially by design is a HTTPS MITM is another matter entirely! ",
"sig": "39b89fd60ba798651accdeb4b0427532983eaa7d8a28c7187e607eafa8b3bbd89b7e18d803a02e67a0205703e0ec75b9897a54320e00ad597ae28bbf2ab3afdc"
}