• 6 Posts
  • 581 Comments
Joined 1 year ago
cake
Cake day: December 18th, 2023

help-circle
  • No. If it’s a copy, then it falls under copyright regardless of how the copy is made. The question wasn’t about copying, though.

    Be aware that copyright only covers the creative elements; ie things that other people would do differently. It also doesn’t cover ideas, methods, and the like. It also doesn’t cover very short or obvious creations. So, copyright on code comes from UI design, comments, names, even the ordering of lines, functions, splitting the code into files, using shorthand or not, and so on. Snippets and even short functions are typically not copyrightable. If you have some short program that anyone would write that way, then that’s not copyrightable, beyond comments and maybe names.






  • It’s not necessary to expose the identities of the users. The age confirmation could happen via a password, PIN, or even a physical USB dongle. Tying such methods to a particular identity adds nothing to the age verification.

    If that is not enough, then one would need a permanent, live webcam feed of the user. It could be monitored by AI, and/or police officers could make random checks.

    Granted, one would have to make sure that not everyone behind the same router can use age-restricted services; eg with a VPN. That would let them assign connections to individual, anonymous adults. But I’d guess you could do that anyway with some confidence by analyzing usage patterns. Besides, information on who is in a home can also be found in other places such as social media or maybe company websites. So I do not think this is much new information.

    But thinking about it, one could compartmentalize this.

    The ISP only allows connections to whitelisted servers, including 1 or more government approved VPNs. The ISP refuses connection to these VPNs without age confirmation. The VPN provider does not need to be told the identity of the customer. There needs to be no persistence across sessions. The ISP need not know what sites are visited via VPN. While the VPN provider need not know about sites visited without.

    If you do it that way, the ISP ends up knowing less than before.

    Since both ISP and VPN servers and offices would be physically located in the country, one would have no problem enforcing prohibitions on data sharing, if desired by lawmakers.

    Anyway, this is the only realistic approach in the whole thread. Everything else assumes that Australian law will be followed globally. And then the ISP still has all that usage data. Why not just use a blockchain…


  • I’d lean on the ISPs. Your ISP knows what sites you visit, and they have your location and payment information. They can just insert some verification page when a classified IP is contacted. This gives them hardly any information beyond what they already have. And since they are mainly located in Australia, it is easy to enforce laws on them.

    You have to lean on ISPs anyway because it is quite ridiculous to assume that the entire global internet will implement Australian laws. Does anyone believe that their Lemmy instance will implement some AI face scan or cryptography scheme?

    You would have to block servers that do not comply with the law anyway. The effective solution would be a whitelist of services that have been vetted. In practice, I think we’ll see the digital equivalent of ok boomer.

    If a whitelist seems extreme, then one should have another look at the problem. The point is to make sure that information is only accessed by citizens with official authorization. There is no technological difference between the infrastructure needed to enforce this (or copyrights) and some totalitarian hellscape.







  • can exercising one’s agency over their body really be considered “rent-seeking”?

    First of all, I am not impressed by this kind of emotional manipulation. You are talking about exercising agency, power, over other people’s bodies. If someone, whether a VFX artist or a hobbyist, would use a likeness without a license, you want them stopped. At the end of the day that means that LEOs will use physical force. You may not think of something like copyright being enforced through physical force, but that is what happens if someone steadfastly refuses to pay fines or damages.

    Enforcing intellectual property, like a likeness right, means ultimately exercising power over other people’s bodies. The body whose likeness it is, may not be involved at all. In the typical case of a Hollywood star, they would be completely unaware of what the enforcers are doing.

    Rent-seeking is an economics term. Rent-seeking is as rent-seeking does. You may feel that society - the common people -have to suffer for “justice”, like people were expected to suffer for the diving rights of kings. But you can’t expect people not to remark the negative consequences. Well, I guess if I were living in such a monarchy, subject to the divine right of a king, I would be quite circumspect. I wouldn’t want to be tortured or imprisoned, after all. And yet it moves.

    Usually, rent-seeking involves property, and yet the right to own property is internationally recognized as a human right.

    to alienate workers from their labor and exploit them.

    We’re probably not on the same page regarding terminology. This sounds like a Karl Marx idea. https://en.wikipedia.org/wiki/Marx’s_theory_of_alienation

    Obviously that’s not what you mean. I guess I’m just surprised to see these hints of leftism mixed in with conservative economics.

    SAG-AFTRA

    …is fundamentally a conservative organization. It’s no coincidence that Ronald Reagan was president of SAG, before becoming president of the US. They will favor the in-group over the out-group and the top over everyone at the bottom. That’s what the doctrines you are repeating are designed for.



  • I have the distinct impression that a number of people would object to the purpose of re-hosting their content as part of a commercial service, especially one run by Google.

    Anyway, now no one has to worry about Google helping people bypass their robots.txt or IP-blocks or whatever counter-measures they take. And Google doesn’t have to worry about being sued. Next stop: The Wayback Machine.


  • Are you really conflating people who make their living based upon their acting skills and likeness with landlords?

    No. I am talking about rent-seeking.

    Rent-seeking is the act of growing one’s existing wealth by manipulating the social or political environment without creating new wealth.[1] Rent-seeking activities have negative effects on the rest of society. They result in reduced economic efficiency through misallocation of resources, stifled competition, reduced wealth creation, lost government revenue, heightened income inequality,[2][3] risk of growing corruption and cronyism, decreased public trust in institutions, and potential national decline.

    https://en.wikipedia.org/wiki/Rent-seeking

    You could argue to what a degree landlords or Elon Musk are engaged in rent-seeking. Likeness rights are a clear example, though.

    Imagine in the near future. Some famous person licenses their likeness for a show, game, movie. Maybe the producer hires an unknown actor that is then digitally altered into the famous person, like a more advanced version of Gollum. Or maybe the VFX artists can do it on their own. These guys work. The famous person does nothing. They might be dead, while the rights-owners still collect license fees.




  • From the source:

    Our primary approach calculates training costs based on hardware depreciation and energy consumption over the duration of model training. Hardware costs include AI accelerator chips (GPUs or TPUs), servers, and interconnection hardware. We use either disclosures from the developer or credible third-party reporting to identify or estimate the hardware type and quantity and training run duration for a given model. We also estimate the energy consumption of the hardware during the final training run of each model.

    As an alternative approach, we also calculate the cost to train these models in the cloud using rented hardware. This method is very simple to calculate because cloud providers charge a flat rate per chip-hour, and energy and interconnection costs are factored into the prices. However, it overestimates the cost of many frontier models, which are often trained on hardware owned by the developer rather than on rented cloud hardware.

    https://epochai.org/blog/how-much-does-it-cost-to-train-frontier-ai-models



  • You do realize that the vast majority of voice actors are not famous right?

    Yes, that’s the point. You are not defending voice actors by demanding likeness rights.

    I am not sure why this is so difficult to understand. Maybe there is some confusion about the technology. You only need a few seconds of audio to clone a voice. You don’t need hours of audio from a professional. That’s why the tech can be used for scams. Likeness rights won’t create jobs for voice actors. Only free money for famous people. You can also generate random voices.

    Leading AI voice companies like Elevenlabs require you to have permission to clone a voice. But how can they check if their customers are being truthful? In practice, it simply means that famous people, whose voices are known, may not be imitated. Likeness rights, by their nature, can only be enforced, with any kind of effectiveness, for the rich and famous.

    OpenAI tried to hire Johansson. When she declined, they hired a different, less famous actress. Maybe they did that to defend against lawsuits, or maybe it gives better results. If they had engineered a nonexistent voice, it would be almost impossible to make the case that they did not imitate Johansson. But still, everyone is talking about that poor famous, rich person who got ripped off. What about the actress who actually provided the voice? I guess she can look for another job, because Johansson owns that voice type.

    one of the few influential unions in the US

    You mean Ronald Reagan’s old outfit? Do you even know who Ronald Reagan was?