Tag: moderation
- 
		
		
		Simon Willison’s Weblog: Veo 2Source URL: https://simonwillison.net/2024/Dec/16/veo-2/#atom-everything Source: Simon Willison’s Weblog Title: Veo 2 Feedly Summary: Veo 2 Google’s text-to-video model, now available via waitlisted preview. I got through the waitlist and tried the same prompt I ran against OpenAI’s Sora last week: A pelican riding a bicycle along a coastal path overlooking a harbor It generated these four… 
- 
		
		
		Hacker News: UK online safety regulation comes into forceSource URL: https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/time-for-tech-firms-to-act-uk-online-safety-regulation-comes-into-force/ Source: Hacker News Title: UK online safety regulation comes into force Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The new codes of practice and guidance issued by Ofcom under the UK’s Online Safety Act mandate that tech companies implement measures to mitigate illegal online harms, particularly aimed at protecting children… 
- 
		
		
		Hacker News: "Silicon Valley Is Turning into Its Own Worst Fear" Ted Chiang (2017)Source URL: https://www.buzzfeednews.com/article/tedchiang/the-real-danger-to-civilization-isnt-ai-its-runaway Source: Hacker News Title: "Silicon Valley Is Turning into Its Own Worst Fear" Ted Chiang (2017) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text explores the potential dangers and ethical dilemmas surrounding the development of superintelligent AI, emphasizing the lack of regulation, ethical considerations in tech corporations, and the… 
- 
		
		
		Simon Willison’s Weblog: LLM FlowbreakingSource URL: https://simonwillison.net/2024/Nov/29/llm-flowbreaking/#atom-everything Source: Simon Willison’s Weblog Title: LLM Flowbreaking Feedly Summary: LLM Flowbreaking Gadi Evron from Knostic: We propose that LLM Flowbreaking, following jailbreaking and prompt injection, joins as the third on the growing list of LLM attack types. Flowbreaking is less about whether prompt or response guardrails can be bypassed, and more about… 
- 
		
		
		Hacker News: Creating a social photo frame from scratchSource URL: https://insignificantdatascience.substack.com/p/creating-a-custom-social-photo-frame Source: Hacker News Title: Creating a social photo frame from scratch Feedly Summary: Comments AI Summary and Description: Yes Summary: The text describes a creative project where the author builds a dynamic digital photo frame powered by generative AI, specifically using DALL-E for image generation and Twilio for prompt submissions. The project… 
- 
		
		
		Hacker News: Child safety org launches AI model trained on real child sex abuse imagesSource URL: https://arstechnica.com/tech-policy/2024/11/ai-trained-on-real-child-sex-abuse-images-to-detect-new-csam/ Source: Hacker News Title: Child safety org launches AI model trained on real child sex abuse images Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the development of a cutting-edge AI model by Thorn and Hive aimed at improving the detection of unknown child sexual abuse materials (CSAM).…