Putting aside the ludicrous confidence score, the student's question was: how could his sister convince the teacher she had actually written the essay herself? My only suggestion was for her to ask the teacher to sit down with her and have a 30-60 minute oral discussion on the essay so she could demonstrate she in fact knew the material. It's a dilemma that an increasing number of honest students will face, unfortunately.
How would that actually work?
TLS runs on the client and the server. There's no "TLS magic box" in between.
Like let’s say you have a proxy server like Nginx on a server with a public facing ip address and then it also has access to a private subnet where your application servers are running. A visitor to your website’s browser make a secure https connection the nginx server where https would be terminated and then it would proxy traffic in plain http over your internal private subnet to the app server. And your are in a five eyes country where your intelligence services took it on themselves to follow the nsa or fbis instructions and plug a network device into those private subnets of all the big service providers inside their datacenters that is configured in something like a promiscuous way so it receives all the packets for any device on the network. Then those packets somehow end up in a big nsa datalake.. or something along those lines
So much could be intercepted back then because of this. It wasn't until 2010 that various large services—including Yahoo Mail and Facebook—got a kick in their ass by a whitehat browser plugin that allowed anyone on the same network to trivially hijack session cookies of others, stimulating an adoption of HTTPS[1] during 2011-2012.
By the time the Snowden leaks occurred in 2013 the trend was heading toward encrypted-by-default and governments were having to adapt.
[1] https://threatpost.com/facebook-kills-firesheep-new-secure-b...
> After Alice logs in on a new device, she uses her cryptographic identity to demonstrate to Bob that the new device genuinely belongs to her, rather than being added by someone else with access to her account. She can do this either by entering her recovery key (which gives the new device immediate access to her cryptographic identity ), or by carrying out an interactive verification from an existing verified device.
Keep in mind that this is their goal statement (straight from their FAQ):
> Our goal is to maintain and advance Pebble functionality, in the absence of Pebble Technology Corp.
Eric's new company, by effectively re-creating Pebble Technology Corp, is an existential threat to that mission: If there is someone else maintaining and advancing Pebble functionality, then what is the purpose of Rebble? It does seem unfortunate though -- I hope they can all work something out.
https://huggingface.co/NaniDAO/deepseek-r1-qwen-2.5-32B-abla...
https://www.lesswrong.com/posts/jGuXSZgv6qfdhMCuJ/refusal-in...
I like the Qwen models and use them for other tasks successfully. It is so interesting how LLMs will do quite well in one situation and quite badly in another.