𞋴𝛂𝛋𝛆

  • 455 Posts
  • 4.47K Comments
Joined 2 years ago
cake
Cake day: June 9th, 2023

help-circle
  • Not exactly. Probably a generative tool flow, but there is no model with this kind of temporal consistency based on prompting alone, at least any that I am aware of. I could do this, but it would take an iterative tool chain and some complexity that would rival or eclipse the time spent on the average good meme. I could easily do some parts of this like the age progression of the girl. I could do the boy too, but the cartoon like expression is an outlier that has deeper implications about what else could be generated along side this specific frame. I would need to create the older to normal younger. Then take this normal younger and uniquely prompt it to create that face. The crossed eye is most telling.

    Regardless of subject and execution, compositionally, I don’t think it is a raw prompt. Meme slop – probably. AI slop – not by definition unless asking some Luddite techno Amish their dogmatic take on a tool.

















  • Actually look at the way Discord works in your network, like all the raw IP addresses and and connections with no clear ownership or human readable name, with dozens of changing connections to get any of it to work. Then go try to ask questions about what is going on and who you’re connecting to. Discover that none of it is documented or described anywhere. Then realize that this means no one running Discord is doing so on a fully audited and logged host. You simply cannot be without a bunch of effort. I made it to the 6th layer of whitelisted raw IP addresses, and still nothing worked while trying to connect to Discord in a fully logged and documented network. I am simply unwilling to write a script to annotate that many connections so that all of my logs make sense. I seriously doubt anyone on Discord is doing so, and they certainly lack any understanding of what they are connecting to, why, or the protocols. So the Discord user is telling me “my opsec and privacy awareness is as nonexistent as a pig in a herd running off a cliff, and my system should be assumed compromised with no idea of what might be connected.” Everyone else doing it is a garbage excuse. That no one appears to have gotten hurt – has tissue thin merit, but also reveals that the user runs blind in herds while hoping for the best. Such information infers a lot about a person, their depth, accountability, and ethics – in certain scopes.