

You can run it yourself on a closed network if you’re worried about telemetry, that’s part of the point.


You can run it yourself on a closed network if you’re worried about telemetry, that’s part of the point.


is this with or without the prompt including politically sensitive topics?


Check out Apertus , the Swiss are showing how it should be done. 100% open: architecture, training data, weights, recipes, and final models all publicly available and licenses Apache 2.0. https://ethz.ch/en/news-and-events/eth-news/news/2025/09/press-release-apertus-a-fully-open-transparent-multilingual-language-model.html


Prohibition leads to the propagation of means of evasion. By attempting to ban teenagers from popular means of communications they will incentivize mass adoption of “illicit means” of communications, and create another generation both familiar and comfortable with “illegal online activity” like the Napster generation. Just like Napster, this will also accidentally push youth into online platforms and channels where they are more likely to encounter content not suitable for minors and malware.
The only “truly effective” form that this type of internet control can take is requiring a digital ID verification to establish a connection to the network at the ISP, and that is a nightmare setup we should be prepared to fight tooth and nail.


I have suggested a couple of times now that ActivityPub should implement an encryption layer for user authentication of requests and pings. It already has a system for instances vauching for each other. The situation is that users of “walled garden” instances in ActivityPub lack means of interfacing with public facing instances that doesnt leave the network open for scraping. I believe a pivot towards default registered users only content service built on encrypted handshakes, with the ability for servers to opt-in to serving content to unregistered users would make the whole network much more robust and less dependent on third party contingencies like CloudFlare.
Then again, maybe I should just be looking for a different network, I’m sure there are services in the blockchain/cryptosphere that take that approach, I just would rather participate in a network built on commons rather than financialization at it’s core. Where is the protocol doing both hardened network and distributed volunteer instances?


How is Gemini fairing in the existing bot landscape? Usenet?


Damn, how was this not big headline news?


And of course in Cyberpunk the ttrpg setting much of the o0en internet was rendered useless by self replicating AI malware hijacking storage, processing, and bandwidth due to a zero day exploit discovered by one egomaniacal hacker.
corn me up snake, I’m passing through your bountious fields shortly
Yes, the idea of the physical ID card they discuss makes a lot of sense, however that has the problem of associating your device with your ID.
When it gets to cloud hosting the personal data and an intermediary validation service that’s where I get even more skeptical.
I have a vague idea about a system that uses a time and topology based encryption where a person’s private information is encrypted and can generate a public key pair that will only match within a set time frame so that the data is held on government servers fully encrypted and when the user issues a “consent” that consent enables validation of a check-sum when both the user and the website provide the public keys without directly querying the government database. So basically the website is issued a public key by the server that works for all citizens that are above an age limit, and the users are sent private keys from their government data store whenever new data is encrypted. If the user’s age is above the limit, the user’s key will validate the age check, and because the key changes rapidly over time it cant be used to correlate the individual across multiple validation checks.
Users can host a version of the data store locally, that can be validated as matching the government store using the query “is there a match to the shape of this encrypted data” rather than querying a specific citizen info store (this is blockchain tech, but can be centralized). This could be used to fight against identity theft, which is certain to be a crime that spikes with any digital ID system. Thats not the most clear but I think you’ll get the gist, no intermediaries necessary.
All this said, in the US there are private services that validate physical ID cards using the codes on the back or a scan of a photo of the ID, so clearly the information has already been made available to private industry from the government through some channel. So that might be even worse than proposed systems in other nations already, I dont know.
A pretty good system, the crucial implementation being a robust consent management system for data access, and Metadata tracking to make sure the account identifier isn’t being used behind the scenes as a de-facto tracker by the public sector.
To me the risk of Digital ID is two fold, one it gives the government a centralized means of tracking individual behavior and thereby crushing dissent (from a Social Credit System, to straight up Russian style gulagging the opposition). On the flip side it gives private sector actors a central immutable identifiers to associate behavior with that can’t be erased by deleting or abandoning an account.
Age Verification is the point where these two concerns are merging into one. Abolishing online anonymity is tantamount to universal surveillance by both the state and private actors, setting up a system of automated persecution tyrants have dreamed of for ages but hasn’t been possible until today with Machine Learning making mass data processing automation both viable and feasible.
Fascist population control and the “final solution” weren’t possible in the way they were implemented until IBM sold the Germans early tabulating machines / computers. ML is the next phase of that same arc of development.
Use of Digital ID to log internet activity is what makes individual data streams continuous, contiguous, and compileable by default.
The consequences are clear, the question is what we can do to prevent it from happening.
This is the biggest struggle of the decade at least. It needs to be forced on every politician as an issue to make statements on. No votes for Digital ID supporters.


What are the implications for users of FOSS? Should we not be downloading from github?


Links in the article. Hugging Face and Swiss Telecoms host


a gentleperson and a scholar


Please read the article before commenting.
“The model is named Apertus – Latin for “open” – highlighting its distinctive feature: the entire development process, including its architecture, model weights, and training data and recipes, is openly accessible and fully documented.”


Thanks, that is very clear


for reference it looks like those are his custome Space X sneakers, which look especially terrible in this lighting.
Everyone’s shoes are a bit stretched by the wide angle lenses being used, which is why Elon’s feet look freakishly ling and skinny. He does have pretty big feet for his height, or has been doing this oversized shoe gag for a very long time.
Overall his outfit is trash


Does Delta Chat / Arcane Chat suffer from the same vulnerability?
Thanks