Simply paying is not sufficient. You need to be a telecom company, or a researcher afaik.
In what world would the US gov care to get into your bank account? Or your Facebook account when it’s already tightly controlled?
Simply paying is not sufficient. You need to be a telecom company, or a researcher afaik.
In what world would the US gov care to get into your bank account? Or your Facebook account when it’s already tightly controlled?
Proton is already used for identity management: OTP via email. They’ll implement OAuth if there’s enough demand for it. A company’s purpose is to be profitable, ethics side is largely irrelevant.
Many countries already have digital government ID: Australia, Estonia, Russia.
Watch the video again to see how hard it was for Derrick to get access. He got it via his telecom/academia researcher contact.
S7 will be retired or extended with access control. TOTP apps don’t work for edge cases like broken phone. Dedicated token devices get lost. SMS will continue being the main solution for 2FA.
Large gains were due to scaling the hardware, and data. The training algorithms didn’t change much, transformers allowed for higher parallelization. There are no signs of the process becoming self-improving. Agentic performance is horrible as you can see with Claude (15% of tasks successful).
What happens in the brain is a big mystery, and thus it cannot be mimicked. Biological neural networks do not exist, because the synaptic cleft is an artifact. The living neurons are round, and the axons are the result of dehydration with ethanol or xylene.
Not true. SMS is encrypted in 3G, LTE, 5G. Block cyphers like Kasumi and A/9 are used. SMS is reasonably secure, because it’s hard to infiltrate telecom systems like S7
AGI or human level intelligence has a hardware problem. Fabs are not going to be autonomous within 20 years. Novel lithography and cleaning methods are difficult for large groups of humans. LLMs do not provide much assistance in semiconductor design. We are not even remotely close to manufacturing the infrastructure necessary to run human level intelligence software.
LLMs are not programmed in a traditional way. The actual code is quite small. It mostly runs backprop, filters the data. It is already easily generated by LLMs.
Broke back convolution
What about people who only have one device? Kids, elderly, people with only work computer.