• 0 Posts
  • 197 Comments
Joined 1 year ago
cake
Cake day: June 7th, 2023

help-circle
  • I agree with those that say Inkscape, it’s where I’ve designed all my logos. However, I’ve been tempted to try using FreeCAD to do it lately. I’m not sure if it can export as SVG, but the thought of have a proper parametric tool for designing logos sounds up my ally. I tend to try to treat Inkscape like one, by liberal use of construction lines, but at the end of the day, it really doesn’t like being that precise.


  • Yeah, the genie is out of the bottle on this one. I can do voice cloning with consumer hardware and available models. That can’t be undone, but good legal protections would be nice.

    That said, the Johanson case is a bad example because it really didn’t sound much like her at all. It was a chipper yound white lady sound, but to my ear sounded nothing like Johanson. It did sound kinda like a character she voiced, but I would not gave confused the two. They cloned the voice of someone they paid to give a similar inflection as the voice from Her. That’s far removed from cloning Johanson herself. It is closer to people making music “in the style of”.
















  • As a LightBurn user and license holder, this is annoying, but I could see this being a good thing in the long run. Right now, there is very little opensource alternative to LightBurn. As of today, there is a much stronger incentive to make it happen. I’m hopeful this spurs on a modern tool in the open source community that works as an alternative. What LightBurn might have done is save them selves some support overhead and created competition. We’ll see how that works out for them.



  • Effectively, the other option is passwords, and people are really, really, bad at passwords. Password managers help, but then you just need to compromise the password manager. Strong SSO, backed by hardware, at least makes the attack need to be either physical, or running on a hardware approved by the company. When you mix that with strong execution protections, an EDR, and general policy enforcement and compliance checking, you get protection that beats the pants off 30 different passwords to 30 different sites, or more realistically, 3 passwords to 30 different sites.