• 0 Posts
  • 56 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle








  • 14th_cylon@lemm.eetolinuxmemes@lemmy.worldtoxic help forum
    link
    fedilink
    arrow-up
    8
    arrow-down
    2
    ·
    1 month ago

    I could do this in about five seconds with Corel PhotoPaint.

    that is because you are familiar with corel photopaint. i could do that faster than you in gimp, because i am familiar with gimp.

    and yes, using tool capable of doing lot of complex tasks takes more time to learn than some single-purpose tool that is optimized to do one task (and even then you have to learn how to use it). that is like wondering that learning to pilot aircraft takes longer than learning to ride on a bicycle.







  • And (by how I understood it) the point of the I1I1 plate was that it wasn’t easily discernible and the camera couldn’t identify it correctly

    the point was it was hard to read and remember for a human. hence why the witness in the comic gives only vague description, which is what the owner of the sneaky plate hoped for, but due to its uniqueness the police knew and the plate failed to achieve its intended purpose on a spectacular level. there was no automation involved at all.




  • identify - maybe, prove it at the court of law - somewhere between hard and impossible.

    say you have found all these “not that many” cars, and now what? you would have (may slightly depend on the local law) prove who is the driver. that may be impossible, even if you have photo of the driver and photo of the suspected owner and you “think” they match.

    the car also doesn’t have to be local, whatever your threshold for what local is is.


  • All you’re doing is showing something in public which is perfectly legal.

    no, it is not, showing something in public is often not legal, it - as is often the case - depend on the context.

    It doesn’t damage the camera.

    it damages the database.

    then that’s on them if something bad happens. You have no control over what happens inside of their computer.

    no, that is on you, because you made that clearly intentionally malicious input. it is the same as if you had used the keyboard, the input method is really not important.

    do you think that if you successfully hack a bank and steal some money you will get away with the defense of “all i did was send your computer some input, sending input to computers is perfectly legal and i really don’t have any control over what is going inside it”?

    that is 5 year’s old idea of how law works.