• 0 Posts
  • 11 Comments
Joined 23 days ago
cake
Cake day: June 5th, 2025

help-circle



  • This is the argument that bothers me:

    The court also identified a third argument, which the authors didn’t pursue in great detail; market dilution. Under this theory, AI models trained on copyrighted works can generate “countless works that compete with the originals, even if those works aren’t themselves infringing,” Judge Chhabria wrote.

    So, even if what you make isn’t infringing on their rights, its still competing with them which should be forbidden. That whole argument is a machine shouldn’t be allowed to compete with a human. So, if I am inspired by another’s work, that’s ok, but if a machine does that we need to ban it.





  • So, this was more common when WEP encryption was used. You could just listen to the radio traffic of the given network and collect IVs which the encryption would leak. Once you had enough pieces you could reassemble the key and access the network. When WPA came out it was harder, but tools like pyrit and john the ripper helped, so long as you were able to capture the 4-way TCP handshake.

    To actually see the networks, you would build biquad parabolic antennas from old DirecTV dishes people left behind. They were very directional high gain antennas that you would just target at someone’s house. We’d also build cantennas from junk laying around. Those were interesting days.