the methods used by thiefs to try and get access to your phone data.
It is not about accessing the data but to disassociate the current user from the phone so that the thief can reset the phone or/and it’s components for new users.
the methods used by thiefs to try and get access to your phone data.
It is not about accessing the data but to disassociate the current user from the phone so that the thief can reset the phone or/and it’s components for new users.
no matter our computational techniques, the diminishing returns in predictive precision is reached far sooner than we achieve general intelligence
That’s very bold presumption. How can they be so sure of this, that any future models can’t tackle the issue? have they got proof or something.
Hey, I follow up your suggestion - come back and read the article. No doubt, a very engaging read. Thx.
thx.
thx.
anyone can tldr?
deleted by creator
For me that’s just envy. You define people based on what you don’t get.
Your thinking is so interesting that I need to learn the way you think. Please answer this if you don’t mind: If someone who are good at what they are doing are garbage, how do you define those that are not good at what they are doing?
They should but easy to say than done. In the end they will return back to it if no better or at least equal alternatives are out there to fill the vacuum.