Natalie Sontopski
@stromponsky.bsky.social
Researcher 🔮 More-Than-Human Design //STS // Feminism // Critical AI
Weil hier vorwiegend männliche AI-Beobachter genannt werden, droppe ich mal dass es auch sehr viele kundige kritische AI-Beobachterinnen gibt, z.B. @emilymbender.bsky.social und @timnitgebru.bsky.social
November 1, 2025 at 9:49 AM
Weil hier vorwiegend männliche AI-Beobachter genannt werden, droppe ich mal dass es auch sehr viele kundige kritische AI-Beobachterinnen gibt, z.B. @emilymbender.bsky.social und @timnitgebru.bsky.social
Reposted by Natalie Sontopski
All in all, a very kafka-esque experience of bureaucracy, ineffiency and frustration to quiet resignation.
July 14, 2025 at 11:17 AM
All in all, a very kafka-esque experience of bureaucracy, ineffiency and frustration to quiet resignation.
Same thing with Google: I logged in and was asked to verify myself with the code I got via text. So I chose the option of backup Codes only to discover that Google needs me to verify this decision by sending a text to my phone. Which I dont have. Ergo cant verify shit.
July 14, 2025 at 11:17 AM
Same thing with Google: I logged in and was asked to verify myself with the code I got via text. So I chose the option of backup Codes only to discover that Google needs me to verify this decision by sending a text to my phone. Which I dont have. Ergo cant verify shit.
This has happened twice to me already and I really dont know why nobody has designed a protocol for this case? Like how do you use 2 Factor Authentication if the source of identification is missing?
July 14, 2025 at 11:17 AM
This has happened twice to me already and I really dont know why nobody has designed a protocol for this case? Like how do you use 2 Factor Authentication if the source of identification is missing?