• 0 Posts
  • 8 Comments
Joined 4 years ago
cake
Cake day: January 17th, 2022

help-circle





  • A lot of already great advice here, often clarifying that a computer that is not yours… is not yours.

    What I would still add though is that you are NOT, and I’m very confident in saying this, the only one there, in your very school, to ask that question. In fact I would argue MOST users have the exact same concerns but they might even be aware that alternatives exist.

    So… do not push back, or even just avoid, all this alone. Find others who have similar problems and solve them together.

    There might be a Linux User Group already, join them. If there isn’t one, consider making it. It might just be you for few weeks, even month, but at least you will dedicate time and space to improve YOUR situation. Chances are though that others, even if only curious at first, might check what you are up to, if they can replicate that, etc.

    Don’t feel isolate, move the needle for yourself first, in your corner, but be welcoming to others who are eager to contribute.

    It’s a challenge, but it’s a fun challenge while trying to tackle it with others.



  • Worthwhile yet tricky. Companies like OpenAI, Google, Meta, etc are full of experts in statistics and they have access to a lot of storage space. If use a service from those companies, say 4hrs per day between 7am and 9pm, at a certain frequency, e.g. 10 requests / hour, then suddenly, when you realize you actually do not trust them with your data, you do 10000 req/hr for 1hr then that’s a suspect pattern. Then might be able to rollback until before that “freak” event automatically. They might still present you as a user your data with the changes but not in their internal databases.

    So… I’m not saying it’s not a good idea, nor useful, but I bet doing it properly is hard. It’s probably MUCH harder than do a GDPR (or equivalent) take out request then deletion request AND avoiding all services that might leverage your data from these providers.