I think I know what the issue is.
They probably mean they don’t provide support via the official channels due to the support being experimental, instead you’d report bugs directly to the kdeconnect-mac repo.
Your colors are inverted.
The accessibility icon never follows accent color, and firewall is always red not blue.
Something is swapping your colors around.
Maybe color correction for the color blind?
Blue -> Yellow
Red -> Blue
Ofc it’s prone to bullshitting, it can’t even stay consistent; shit will contradict itself and sight the same sources.
Why do you think trump started peddling Jesus bullshit last time he ran even though he’s not even remotely cristian or religious. He’ll shill anything as long as he thinks it’ll profit him.
The fact people bought NFTs just proves that crypto bros just buy into hype without understanding the technology.
I knew NFTs were bullshit from the start because I actually took the time to understand how they “worked”.
That goes for both…
We’re discussing Apple’s implementation of an OS level AI, it’s entirely relevant.
GrapheneOS has technical merit and is completely open source, infact many of the security improvements to Android/AOSP are from GrapheneOS.
I love Olan’s.
Who?
Yeah and apple is completely untrustworthy like any other corporation, my point exactly. Idk about you, but I’ll stick to what I can verify the security & privacy of for myself, e.g. Ollama, GrapheneOS, Linux, Coreboot, Libreboot/Canoeboot, etc.
However, to process more sophisticated requests, Apple Intelligence needs to be able to enlist help from larger, more complex models in the cloud. For these cloud requests to live up to the security and privacy guarantees that our users expect from our devices, the traditional cloud service security model isn’t a viable starting point. Instead, we need to bring our industry-leading device security model, for the first time ever, to the cloud.
As stated above, Private cloud compute has nothing to do with the OS level AI itself. ರ_ರ That’s in the cloud not on device.
While we’re publishing the binary images of every production PCC build, to further aid research we will periodically also publish a subset of the security-critical PCC source code.
As stated here, it still has the same issue of not being 100% verifiable, they only publish a few code snippets they deam “security-critical”, it doesn’t allow us to verify the handling of user data.
- It’s difficult to provide runtime transparency for AI in the cloud. Cloud AI services are opaque: providers do not typically specify details of the software stack they are using to run their services, and those details are often considered proprietary. Even if a cloud AI service relied only on open source software, which is inspectable by security researchers, there is no widely deployed way for a user device (or browser) to confirm that the service it’s connecting to is running an unmodified version of the software that it purports to run, or to detect that the software running on the service has changed.
Adding to what it says here, if the on device AI is compromised in anyway, be it from an attacker or Apple themselves then PCC is rendered irrelevant regardless if PCC were open source or not.
Additionally, I’ll raise the issue that this entire blog is nothing but just that a blog, nothing stated here is legally binding, so any claims of how they handled user data is irrelevant and can easily be dismissed as marketing.
AI powered Rootkit.
Their keynotes are irrelevant, their official privacy policies and legal disclosures take precedence over marketing claims or statements made in keynotes or presentations. Apple’s privacy policy states that the company collects data necessary to provide and improve its products and services. The OS-level AI would fall under this category, allowing Apple to collect data processed by the AI for improving its functionality and models. Apple’s keynotes and marketing materials do not carry legal weight when it comes to their data practices. With the AI system operating at the OS level, it likely has access to a wide range of user data, including text inputs, conversations, and potentially other sensitive information.
Apple claimed that their privacy could be independently audited and verified.
How? The only way to truly be able to do that to a 100% verifiable degree is if it were open source, and I highly doubt Apple would do that, especially considering it’s OS level integration. At best, they’d probably only have a self-report mechanism which would also likely be proprietary and therefore not verifiable in itself.
Yes, on Android. From my own investigations, it appears to have a really bad malware problem despite it’s claims of scanning for malware, especially for the free distributions of paid apps from the Google Play Store, which constitutes piracy and copyright infringement raising ethical issues.
you can use it in almost any app
if done right
How are you going to be able to use it in “almost any app” in a way that is secure? How are you going to design it so that the apps don’t abuse the AI to get more information on the user out of it than intended? Seems pretty damn inherently insecure to me.
1. Monopolistic business practices to crush competition (Netscape, Java, web browsers, etc.).
2. Illegal bundling of Internet Explorer with Windows to eliminate browser rivals.
3. Keeping useful Windows APIs secret from third-party developers to disadvantage competitors.
4. Embracing proprietary software and vendor lock-in tactics to prevent users from switching.
5. “Embrace, Extend, Extinguish” strategy against open source software.
6. Privacy violations through excessive data collection, user tracking, and sharing data with third parties.
7. Complicity in enabling government surveillance and spying on user data (PRISM scandal).
8. Deliberately making hardware/software incompatible with open source alternatives.
9. Anti-competitive acquisitions to eliminate rivals or control key technologies (GitHub, LinkedIn, etc.).
10. Unethical contracts providing military technology like HoloLens for warfare applications.
11. Failing to address workplace issues like sexual harassment at acquired companies.
12. Forced automatic Windows updates that override user control and cause system issues.
13. Maintaining monopolistic dominance in productivity software and operating systems.
14. Vague and toothless AI ethics principles while pursuing lucrative military AI contracts.
15. Continued excessive privacy violations and treating users as products with Windows.
16. Restrictive proprietary licensing that stifles open source adoption.
Aptoide sucks.
Nice.
Don’t forget to put [Solved] in your post title.