Notice: file_put_contents(): Write of 8291 bytes failed with errno=28 No space left on device in /var/www/tg-me/post.php on line 50
每周一书 🎉 | Telegram Webview: weekly_books/2114 -
Telegram Group & Telegram Channel
#观点

社交巨头 Meta 下载了盗版电子书去训练其 AI 模型,最新证据显示 Meta 的盗版规模惊人。Meta 通过安娜的档案(Anna's Archive)下载了至少 81.7 TB 的数据,其中包括来自 Z-Library 和 LibGen 的至少 35.7 TB 的数据(安娜的档案包含了 Z-Lib、Sci-Hub 和 LibGen 的镜像站)。Meta 之前还从 LibGen 下载了 80.6 TB 的数据。图书作者称,Meta 非法的电子书库种子下载规模惊人,认为这只是冰山一角,这些盗版电子书库仅占 Meta 盗版版权作品数量的 0.008%。

提供大语言模型数据这可能是「安娜的档案」项目实现收入的途径之一。🌚

https://zh.annas-archive.org/



tg-me.com/weekly_books/2114
Create:
Last Update:

#观点

社交巨头 Meta 下载了盗版电子书去训练其 AI 模型,最新证据显示 Meta 的盗版规模惊人。Meta 通过安娜的档案(Anna's Archive)下载了至少 81.7 TB 的数据,其中包括来自 Z-Library 和 LibGen 的至少 35.7 TB 的数据(安娜的档案包含了 Z-Lib、Sci-Hub 和 LibGen 的镜像站)。Meta 之前还从 LibGen 下载了 80.6 TB 的数据。图书作者称,Meta 非法的电子书库种子下载规模惊人,认为这只是冰山一角,这些盗版电子书库仅占 Meta 盗版版权作品数量的 0.008%。

提供大语言模型数据这可能是「安娜的档案」项目实现收入的途径之一。🌚

https://zh.annas-archive.org/

BY 每周一书 🎉




Share with your friend now:
tg-me.com/weekly_books/2114

View MORE
Open in Telegram


每周一书 Telegram | DID YOU KNOW?

Date: |

Telegram hopes to raise $1bn with a convertible bond private placement

The super secure UAE-based Telegram messenger service, developed by Russian-born software icon Pavel Durov, is looking to raise $1bn through a bond placement to a limited number of investors from Russia, Europe, Asia and the Middle East, the Kommersant daily reported citing unnamed sources on February 18, 2021.The issue reportedly comprises exchange bonds that could be converted into equity in the messaging service that is currently 100% owned by Durov and his brother Nikolai.Kommersant reports that the price of the conversion would be at a 10% discount to a potential IPO should it happen within five years.The minimum bond placement is said to be set at $50mn, but could be lowered to $10mn. Five-year bonds could carry an annual coupon of 7-8%.

Newly uncovered hack campaign in Telegram

The campaign, which security firm Check Point has named Rampant Kitten, comprises two main components, one for Windows and the other for Android. Rampant Kitten’s objective is to steal Telegram messages, passwords, and two-factor authentication codes sent by SMS and then also take screenshots and record sounds within earshot of an infected phone, the researchers said in a post published on Friday.

每周一书 from us


Telegram 每周一书 🎉
FROM USA