med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

373
active users

#whisper

0 posts0 participants0 posts today
Continued thread

Just to clarify: I don't think #AI use is inherently bad for science.
#LLM‘s can help you reword, make text flow better, be more precise and write better, because – unfortunately – training data also includes lots of good scientific texts.
ASR systems like #whisper allow you to spend less time on word by word #transcription and more on what's between the lines.

But use for citing literature? Writing whole sections or papers? Review? Coding in qualitative research?!

That's an issue

люди предлагали выкладывать субтитры Whisper’а в публичный доступ, что я и сделала!

https://wonderfox.anyaforger.art/subtitles/en/

на данный момент есть субтитры к What’s with Andy (кроме первого сезона и части третьего - случайно утеряла часть субтитров при удалении папки с мультиком). этот пост будет обновляться с появлением новых субтитров (а они будут)

wonderfox.anyaforger.artEn – Блобфоксы, кофе и линуха
Replied in thread

@sergio_101

One of my treasures is a vintage hardcopy big-band's book, it has all the parts EXCEPT it seems first trumpet absconded with their folder. I have most charts digitally, so I read off title arranger etc from 2nd trumpet's book and let #whisper generate a search list. In that scenario "close enough" was all I needed 😊

Replied in thread

@sergio_101

I've been using #whisper to transcribe rare #SunRa interviews and while it is impressive, I won't be releasing any until I have time to check them. Which is to say the only effort it really saved me was the bulk of the typing.

It does however timestamp and generate a sub file! I hope someday to do an animation based on some of these interviews!

#ESETresearch analyzed a campaign deployed by BladedFeline, an Iran-aligned threat actor with likely ties to #OilRig. We discovered the campaign, which targeted Kurdish and Iraqi government officials, in 2024. welivesecurity.com/en/eset-res
BladedFeline, a cyberespionage group active since at least 2017, develops malware for strategic access within the Kurdistan Regional Government and the government of Iraq. We discovered BladedFeline in 2023 after it targeted Kurdish officials with the #Shahmaran backdoor.
The systems compromised in the latest campaign contained the #Whisper backdoor, a malicious IIS module #PrimeCache, two reverse tunnels, and several supplementary tools. Whisper uses #MicrosoftExchange server to communicate with the attackers via email attachments.
We believe with medium confidence that BladedFeline is a subgroup of OilRig, an 🇮🇷-based APT group also known as APT34 or Hazel Sandstorm.
First, there were OilRig tools present in the systems compromised in this campaign. BladedFeline’s PrimeCache also shares code similarities with OilRig’s #RDAT backdoor. Moreover, as does OilRig, BladedFeline targets organizations in the Middle East.
IoCs will be available in our GitHub repo: github.com/eset/malware-ioc/tr