• 2 Posts
  • 513 Comments
Joined 1 year ago
cake
Cake day: June 28th, 2023

help-circle


  • Sorry… busy day and I’m going to need a real computer for this 😅

    RE Free… nothing really, just being bitter. I’m not a huge fan of a lot of the little tie-ins like Pocket, but I respect the hustle… if not the business plan.

    The Amazon review thing they bought is Fakespot™, check it out if you shop on Amazon. Here the Ai nonsense is just some summaries of the reviews it digested… not inherently bad, but the whole experience is painfully slow. Still. Well worth checking out if you haven’t.

    Shady dude gets a 📌 for now. Sorry. Time.

    If you check out Fakespot you can’t miss it. Have yet to try the browser integration, although I have enabled it for some reason…  


  • You gotta love that there are benchmark for that… The company that can’t even get free, right.

    I really like their Amazon reviews thing that they bought… I bet the shady dude that had all the fucking people finder sites was in charge of that cause it’s got the same kind of fucking cheesy-graphic-load-screen… basically, the only functional piece of software they had at that point cause they hadn’t touched it, and then they went an AIed it up…

    Here’s a new idea, why doesn’t everybody in the fediverse post their favorite privacy enhanced Firefox rebrand:














  • Yeah, I wasn’t going to go and call that case-closed; industry tactics exposed, story at 11:00. It’s a theory and intentional or not (misspellings) I think there’s a definite possibility it’s working as described in some cases.

    I like the SaaS theory too, ransomware clearly operates using exactly that model… unfortunately there’s been a few investigations and a lot of it is just the intersection of actual and economic slavery. I suspect there’s some of what you propose as well, why not, right? If we can dream it up somewhere somebody’s probably trying it. But I’d also wager that once you achieve any real proficiency at this kind of low level scam, there’s opportunity in organized computer crime, spearfishing and pretexting scams, operations with more sophisticated planning.