Should be, AI is indeed revolutionary but it should be controlled before massive misuse happens like in the case of Deepfakes, morphs, disruption of E-KYC etc.
Mota bhai in action. This will be the most interesting disruption *if* it happens.
9 replies7 likes
Uttkarsh Singh
Stealth • 9m
Nearly all of the deepfake videos are pornographic, with 96% of the deepfakes consisting of pornographic content, and all of that pornographic content featuring women; with AI you can see that spike; this use case of AI should be monitored.
2 replies7 likes
Amanat Prakash
Stealth • 2d
Stay Strong Against Loan Recovery Harassment
If you or someone you know is being harassed by loan recovery agents, remember this: you have rights, and you don’t have to suffer in silence.
1: Protect Your Personal Details: Never share sensitive info
See More
0 replies6 likes
Minnu Teja Y
Stealth • 3m
That's what happens to genZ & gen alpha when they have unsupervised access to the internet. Parents should learn how to be parents before the child is born.
1 replies6 likes
Nandhakishore
Stealth • 8m
Yooo guyss looking for an cofounder to
built an revolutionary product , he
should have great knowledge and
passion in programming. If interested let
me know.
It will be very gud if you are from south
india.Only necessary condition is that
should not
I think next civil war in India happens because of tax . We are facing this huge problem since 1947 and every government force only middle class people's for tax . According to reports only 3.5% people in India paying tax and other are just enjoying
Artificial intelligence models like ChatGPT are designed with safeguards to prevent misuse, but the possibility of using AI for hacking cannot be ruled out. Countries or malicious actors could create AI systems specifically for unethical purposes, su
As someone who has been working remotely for almost 15 years, I've witnessed it firsthand the impact of this work model. Remote work has indeed been revolutionary but its effects run deeper than what you think.
1. Realise this: Remote work is a mas
EPFO (employees have control over their data)
If the login credentials are compromised, employee data can be accessed by anyone.
It is essential for the employees to have control to their data. Only the employees should be allowed to enter their dat
🔒 As an entry-level security analyst, safeguarding organizational assets against threats is paramount. Understanding the various forms of threats is key to fortifying our defenses. Here are two common types every analyst should be vigilant about:
•