• some_guy@lemmy.sdf.org
    link
    fedilink
    arrow-up
    64
    ·
    6 months ago

    “Confronted with the evidence, Kramer admitted that he commissioned the call, but he insisted he only did it to prompt stricter regulations of AI deep fakes.”

    I only broke into the bank vault to prove we need stronger bank vaults.

    • Zaktor
      link
      fedilink
      English
      arrow-up
      14
      ·
      edit-2
      6 months ago

      To be fair, what was actually the point of a Democratic consultant getting people not to vote in a primary that awarded no delegates? In the bank analogy he’s robbing the Monopoly bank.

      And just to be clear, I think what he did should be illegal and he should be prosecuted. I just don’t think there was a whole lot to gain had he gotten away with his scheme.

        • Zaktor
          link
          fedilink
          English
          arrow-up
          5
          ·
          6 months ago

          This guy was a Democratic consultant. There were also some Republicans that did something similar.

    • UnderpantsWeevil@lemmy.world
      link
      fedilink
      arrow-up
      6
      arrow-down
      3
      ·
      6 months ago

      I mean, this is unironically what White Hat Hacking is about.

      At some level, I can see a benefit to road testing a strategy like this and then developing countermeasures once you can see the impact. But when its just some random asshole throwing things against the wall to see what sticks, it sounds like he’s more interested in the first order manipulation effect than the second order defensive response.

      • some_guy@lemmy.sdf.org
        link
        fedilink
        arrow-up
        1
        ·
        6 months ago

        Yeah, but there’s a difference between white-hat hacking (where you find an exploit, test it once to confirm its validity, and report it without abusing it) and actually modifying a bunch of records (the equivalent of what this would be). White-hatting tries to be minimally-destructive while proving the vulnerability.