The almost four-hour-long operation of the camera is shown in less than five minutes. That's 40 times the actual speed up to landing and 100 times the actual speed thereafter.
The first part of the movie shows how Titan looked to the camera as it acquired more and more images during the probe's descent. Each image has a small field of view, and dozens of images were made into mosaics of the whole scene. "
I like how clear this visualization is despite being packed with data. Once you start paying attention to the different parameters, you'll find yourself restarting the 5 minutes video to watch some other property.
Hybris is just one component that Mer supports: a compatibility layer which allows the use of Android libraries and drivers. But that doesn't make it the backbone of Sailfish...
The arguments presented here look suspiciously like the arguments scribe classes of old used against the masses learning to read and write.
Seems like we’ve gotten to the point where sloppy writers are worse than LLMs and assume that all “meticulous” writers are LLMs. The only convincing “tell” I have ever heard tell of: characters such as smart quotes, but even those can just be a result of writing in a non-standard or “fancy” editor first. I’ve even seen people say that em dashes are indicative, I guess those people neither care about good writing nor know that em dashes are as easy as option + shift + hyphen on a Mac.
On the other hand, Sailfish phones (https://sailfishos.org/) are Linux-based, tout "Fourth generation security", can run Android apps (the killer feature!), and - most importantly - are available now.
That's a valid reason to serve JS-based PoW systems scares LLM operators: there's a chance the code might actually be malicious.
That's not a valid reason to serve JS-based PoW systems to human users: the entire reason those proofs work against LLMs is the threat that the code is malicious.
In other words, PoW works against LLM scrapers not because of PoW, but because they could contain malicious code. Why would you threaten your users with that?
And if you can apply the threat only to LLMs, then why don't you cut the PoW garbage start with that instead?
I know, it's because it's not so easy. So instead of wielding the Damocles sword of malware, why not standardize on some PoW algorithm that people can honestly apply without the risks?