@Sherifazuhur Um, what censoring? I never asked you to stop posting anything anywhere. I've asked you as an expert on the matter as you seem to promote it and explicitly told you know everything about it.
@jwz wouldn't that overload server' block lists for no good reason?
@Sherifazuhur look, I don't want to contest IDF manufacturing evidence, they have the incentives. What I don't get is why e.g. "quds network' you've boosted decided to spread fakes that are already debunked. They should have plenty of authentic material, why plaster it with lies?
@Sherifazuhur @palestine @israel How do you know the videos of explosions are fake, but videos of.. well.. other explosions aren't?
@Sherifazuhur @palestine @israel It is possible to make a video of anybody saying (and soon, doing) anything for some small bucks.
And pro-palestinian sources are notorious for faking stuff. I don't know why, but the amount of manipulated, generated and otherwise misleading material is through the roof. It's barely possible to believe anything anymore. Maybe you can tell me why they decided to flush their credibility down the drain? Because I don't understand. This psyops doctrine worked fine before pervasive surveillance and global OSINT communities, but shouldn't they stick to hard facts now?
Meanwhile, estradiol-powered von-neuman ~~catgirls~~ probes
@Sherifazuhur @palestine @israel While such videos are reprehensible (if true), the real reason for destruction is that such objects host military infrastructure. Rocket launchers, ammo, tunnels, you know the thing.
@boilingsteam on being right X% of the time when placing X% confidence
@boilingsteam > Since 2001, Hubbard Decision Research trained over 1,000 people across a variety of industries.
> Analyzing the data from these participants, Doug Hubbard reports that 80% of people achieve perfect calibration (on trivia questions) after just a few hours of training.
Wow. I wonder how long does that last
@boilingsteam Hm... I've heard most people can distinguish 2-3 steps between "don't know anything about that" and "willing to bet my ass on it" without training. And with more practice relatively easily add 2 steps more.
I recon discerning between 93 and 96 would be tough for even a practitioner of the art, but most pragmatic questions don't require more than baseline skill level.
One such tool is indeed calibration practice. You git gud at what you do. Posting (and even reading!) confidence-annotated predictions will make your spidey senses tingling for misplaced confidence.
Another powerful tool is hypothetical switch from the original prediction to an equivalent abstract lottery situation. I.e. "New steam deck will be released in the next year (66%)" → "spin the wheel to win with 66% chance (2:1 odds)". One can feel the difference with their guts.
@boilingsteam Yes, but the confidence is important too
One should be right exactly 75% of the time when placing 75% confidence. No more (underconfident), no less (overconfident).
There's a practical difference when ~~betting~~ acting on 80% predictions (fairly sure) vs 55% predictions (barely has any clues) vs 99% predictions (verified insider info?).
I'd even argue predictions without confidence are worse than nothing (i.e. misleading) as they silently substitute readers' subjective verisimilitude for authors' information.
@boilingsteam ... and this is why you should add confidence when predicting events with low base rates.
Those series of "fail" wouldn't look so bad when clearly marked with "10% likely".
@deadblackclover more like "in Lean" those days...
@grumpy_website web got this merged into the clownbutton
@amiloradovsky more discussion clubs in cafes, less hackerspaces
@0x17 good luck, have fun
@tao It's in their published threat model / security assumptions:
> Attackers do not have access to private keys referenced within the C2PA ecosystem (e.g., claim signing private keys, Time-stamping Authority private keys, etc.). They may, however, attempt to access these keys via exploitation techniques...
And later, in the spoofing section.
Proper key handling is notoriously difficult. And with incentives like here, attackers would be motivated to hit it even more than some DRM system.
And anyway, no need for a breakthrough if you can walk in with a gag order and do what you need.
@tao The cryptography infrastructure would be broken܍ in no time and then the courts would have to face "cryptographically secure" fakes.
܍ Knowing ahem.. state actors, the thing would be backdoored through and through so the services could do their thing whenever they need.
@Sherifazuhur While we're at it, why did you explicitly link the older version of the tweet instead of just the recent one?
Toots as he pleases.