Which is funny because they are the most AI replaceable humans in the building. Their entire function is to follow the corporate decision tree to the letter and make sure that all communication upwards gets filtered through their outlook account.
The point of being the boss is getting to decide who to replace with AI, tbh. The shareholders may not replace you because of relationships/trust/accountability, and also because they don't want to have to be instructing the AI day-to-day (or arguing among themselves about it).
Maybe this will change in the future if AI-run companies emerge, get backing, and outcompete existing players.
This. Add some agents installed on employee's PC and AI could have exact picture of whole company at any given time, without these weekly managerial meetings - status relays. No politics. No overseeing. If everyone works remote, the better AI is, because all communication channels could be monitored. Perfect estimation, almost perfect allocation of resources.
Debian, Ubuntu, Suse, and Fedora have had a bug free desktop experience for years. If you stick to the default repositories and use last year's hardware everything just works.
Whether it's a giant corporate model or something you run locally, there is no intelligence there. It's still just a lying engine. It will tell you the string of tokens most likely to come after your prompt based on training data that was stolen and used against the wishes of its original creators.
Factory reset an old phone and leave it in airplane mode.
If it get "lost" or "stolen" you aren't out much, and it doesn't contain any personal information. If "law enforcement" gets their hands on it the only data it has is the IMEI and maybe wireless MACs, enough to ID you based on previous use but they would have to contact telecos and request the info. Current "law enforcement" seems too chaotic to spend time tracing the owner of an empty phone.
For a detailed discussion about phones, personal data and anonymity, there is a good book written by a former police officer: Michael Bazzell (2024) Extreme Privacy: What It Takes To Disappear, fifth edition.
I'm not an expert in digital footprint-hiding, but it's probably a good idea to replace / remove the SIM card as well. A factory reset will leave data laying around, just not accessible through "normal" means.
On any modern phone, your phones user partition is encrypted with a key that is itself encrypted by a key stored in the CPU. When you factory reset, what's happening is basically the key in the CPU is deleted, then re-created. At that point the data on your partition is random noise, so a new encryption key is derived and used to format the partition.
Even better, modern Android then encrypted your personal data with yet another layer based on your password/key/pattern you use to unlock your device. Many layers.
Retrieving that data would be incredibly hard even for a nation state unless the encryption used was deliberately backdoored, and even then once the device TRIM's the space (which it likely does prior to formatting) that data is gone on a hardware level.
(TL;DR Can't move the memory chip to a new device, and even if you backdoor the OS you still need the users password)
LLMs are not intelligent machines, they are lying engines that predict the next most likely thing to do or say. If publishing your credit card details, home address and blood type meshes with the last thing it ingested, it'll do it.
At $70-100 for a "triple A" title, every pixel and line of code had better be personally massaged by developer. There are plenty of one-man-band operations out there making phenomenal games, for less, without needing to generate anything.
Clever, I've done something similar for an Arduino project where each char bitmap includes the pixel width and a vertical offset bit for letters like g or j that hang down below the other letters. Each char bitmap was 5x5px and stored as a 32bit int in an array.
reply