Meanwhile, estradiol-powered von-neuman ~~catgirls~~ probes
@Sherifazuhur @palestine @israel While such videos are reprehensible (if true), the real reason for destruction is that such objects host military infrastructure. Rocket launchers, ammo, tunnels, you know the thing.
@boilingsteam on being right X% of the time when placing X% confidence
@boilingsteam > Since 2001, Hubbard Decision Research trained over 1,000 people across a variety of industries.
> Analyzing the data from these participants, Doug Hubbard reports that 80% of people achieve perfect calibration (on trivia questions) after just a few hours of training.
Wow. I wonder how long does that last ![]()
@boilingsteam Hm... I've heard most people can distinguish 2-3 steps between "don't know anything about that" and "willing to bet my ass on it" without training. And with more practice relatively easily add 2 steps more.
I recon discerning between 93 and 96 would be tough for even a practitioner of the art, but most pragmatic questions don't require more than baseline skill level.
One such tool is indeed calibration practice. You git gud at what you do. Posting (and even reading!) confidence-annotated predictions will make your spidey senses tingling for misplaced confidence.
Another powerful tool is hypothetical switch from the original prediction to an equivalent abstract lottery situation. I.e. "New steam deck will be released in the next year (66%)" → "spin the wheel to win with 66% chance (2:1 odds)". One can feel the difference with their guts.
@boilingsteam Yes, but the confidence is important too
One should be right exactly 75% of the time when placing 75% confidence. No more (underconfident), no less (overconfident).
There's a practical difference when ~~betting~~ acting on 80% predictions (fairly sure) vs 55% predictions (barely has any clues) vs 99% predictions (verified insider info?).
I'd even argue predictions without confidence are worse than nothing (i.e. misleading) as they silently substitute readers' subjective verisimilitude for authors' information.
@boilingsteam ... and this is why you should add confidence when predicting events with low base rates.
Those series of "fail" wouldn't look so bad when clearly marked with "10% likely".
@deadblackclover more like "in Lean" those days...
@grumpy_website web got this merged into the clownbutton
@amiloradovsky more discussion clubs in cafes, less hackerspaces
@0x17 good luck, have fun
@tao It's in their published threat model / security assumptions:
> Attackers do not have access to private keys referenced within the C2PA ecosystem (e.g., claim signing private keys, Time-stamping Authority private keys, etc.). They may, however, attempt to access these keys via exploitation techniques...
And later, in the spoofing section.
Proper key handling is notoriously difficult. And with incentives like here, attackers would be motivated to hit it even more than some DRM system.
And anyway, no need for a breakthrough if you can walk in with a gag order and do what you need.
@tao The cryptography infrastructure would be broken܍ in no time and then the courts would have to face "cryptographically secure" fakes.
܍ Knowing ahem.. state actors, the thing would be backdoored through and through so the services could do their thing whenever they need.
@Sherifazuhur While we're at it, why did you explicitly link the older version of the tweet instead of just the recent one?
@DetersHenning I've been following arabic media for a while and, unfortunately, this is par for the course. Every trick you can find in psyops book is deployed at large.
@DetersHenning @Sherifazuhur @simon_brooke I have a feeling that the post is intended to specifically* support "the court ordered a ceasefire" narrative, with a follow up of "Israel violates the court decision".
*) Given how the first point is phrased and then amended.
@DetersHenning @Sherifazuhur @simon_brooke
Well, "There’s a new version of this post."
https://twitter.com/QudsNen/status/1750868389516513304
But who cares, as long as one can spread the original.
@mjg59 @archiloque @aeva x86 is basically the same. Vendors add extras to prop their benchmark numbers. Then the extras get either adopted or abandoned.
Ditto with software "distributions".
We can live with that, as we have alternatives and not blobs are required for mainstream ops.
@redmp @BoydStephenSmithJr I started to use `where`-like `let`:
```
let
z = bar x
w = zip y
in
whatevs z w
```
This way it better preserves layout when shuffling things around.
Toots as he pleases.