

Ooh, that’s though sweetheart. If the owners of those servers want you to visit, they’ll just choose another WAF than CF’s.
All zero of them.
Ooh, that’s though sweetheart. If the owners of those servers want you to visit, they’ll just choose another WAF than CF’s.
All zero of them.
No, that’s a good point. We all bloody well know there isn’t a single provider of LLM’s that aren’t sucking the entire Internet dry while gleefully ignoring robots.txt and expecting everybody else to pay the bill on their behalf, but the AI providers are getting really good at using other people IPs both to mask their identity and to evade blacklists, which is yet another abusive behavior.
But that’s beside your point. So forget the class-action lawsuit in favor of the relevant Ombudsman.
Either way, this cannot go on. Donation-driven open source projects are being driven into the ground by exploding bandwidth and hosting costs, people are being forced to deploy tools like Anubis that eats additional resources - including the resources of every legitimate user. The cumulative damage this is doing is no joke.
If this isn’t fertile grounds for a massive class-action lawsuit, I don’t know what would be.
The recent relentless AI-ification is another pain-point. People are getting sick of having to constantly fend off slob pull requests.
I usually hit the bottle, but I’m not about to criticize whatever works for you. If rubber duck debugging has been scientifically proven to work, I don’t see any valid argument against coding socks or smooth legs. Besides, those two things go together like insurance companies and arson or AI server farms and power supply cable cutting.
A match made in heaven, in other words.
Nobody said they replicated by authoring the replica from scratch, which seems to be what you’re assuming. A generative AI is ultimately a lump of code and a statistical model. Surely you’re not saying that it cannot copy files given file system access.
Because copying some files and starting new processes is all it really has to do to ‘self replicate’.
I’m no lawyer, let alone a US lawyer, but can somebody explain how this isn’t a violation of the Computer Fraud and Abuse Act, which makes it a federal offense to intentionally access a “protected computer” without authorization or by exceeding authorized access?
For all that it is in truth far more terrifying, I freely admit that expressions like “Oh, in the name of False Vacuum Decay” just doesn’t land the same. It’s s shame, really. Modern scientific curses like “may all your Li-Ion batteries grow centimeter long dendrites in seconds” are much more fearsome than they immediately appear.
I mean, “may your tap water turn to dioxygen difluoride while you’re taking a shower” would make even Satan go, “okay, stop, just… Jesus, stop.”
…That’s genius. Thanks!
See, this is one of those inconvenient situations where us Atheists really lack appropriate and proportional ways to express our feelings about things.
Since AMP, yes. It’s hardly a recent development.