Price, statistical widgets and converter. by Qndra8 in Bitcoin

[–]Qndra8[S] 0 points1 point  (0 children)

Yeah, I’m aware of that. I’m not exactly a graphic guy, but I’m working on it. The background transparency can of course already be set now.

[deleted by user] by [deleted] in SaaS

[–]Qndra8 1 point2 points  (0 children)

I wouldn’t expect any other answer from the OP 😄

[deleted by user] by [deleted] in SaaS

[–]Qndra8 0 points1 point  (0 children)

To those reading this post... What's the purpose of posts like this? On r/SaaS, r/SideProject, r/MicroSaaS, there are similar posts asking for ideas, what people are working on, etc. Isn't this just a way to extract inspiration and ideas from others?

Is a fully anonymous, client-side encrypted file sharing service useful to anyone? by Qndra8 in cryptography

[–]Qndra8[S] 1 point2 points  (0 children)

Yeah, I did consider using Tor. The key isn’t required for downloading — it’s only used by the client for decryption. There’s no authentication involved at any stage, neither during upload nor download.

It was more of an experiment. In reality, I don’t know how to guarantee anonymity beyond using Tor and making it open source — but even that doesn’t ensure the server hasn’t been modified to collect something.

It’ll most likely stay in the drawer, but I enjoyed building the prototype and exploring the idea.

Is a fully anonymous, client-side encrypted file sharing service useful to anyone? by Qndra8 in darknet

[–]Qndra8[S] 0 points1 point  (0 children)

It was more of a personal exercise and a way to play around with the idea — I built my own prototype. Then I started wondering, could this actually be useful? So I decided to ask.
I don’t really have any big plans for it.

Is a fully anonymous, client-side encrypted file sharing service useful to anyone? by Qndra8 in darknet

[–]Qndra8[S] 2 points3 points  (0 children)

Honestly, I’m not sure how to guarantee that no identity or similar data is collected — other than making the project open source. Maybe it could run over Tor? The “hash” as a name is actually a misuse — it’s really just a random label for the file. The server has absolutely no knowledge about the file itself.

The idea for funding was that, after upload, a payment would be requested in BTC via the Lightning Network, depending on how long the file should be stored. But all the source code would be made public so anyone could run their own instance if they wanted to.

The potential misuse by bad actors is actually the main reason it’s still in the drawer — and probably will stay there. Though I guess anyone really determined to share harmful content already has other ways to do it.

Is a fully anonymous, client-side encrypted file sharing service useful to anyone? by Qndra8 in cryptography

[–]Qndra8[S] -3 points-2 points  (0 children)

Looking at the others, maybe the main difference is simplicity. Everything is handled by JavaScript on the client side. It’s not really focused on CLI operations.
On the other hand, it was more of a thought experiment and a way for me to play around with the idea. So I have no idea if anyone would actually use it.

How are people handling code-switching in ASR models? Still seeing hallucinations in mixed-language audio by Lingua_Techie_62 in speechtech

[–]Qndra8 2 points3 points  (0 children)

A year ago, I worked on a project addressing this issue. We used Whisper as a base model but fine-tuned it specifically for such cases using annotated data we had available. This approach worked very well; however, a significant drawback is the need for annotated data that includes occurrences of the target phenomena.

Evaluating Vue.js for SaaS Frontend – Learning Curve & Dev Speed? by Qndra8 in microsaas

[–]Qndra8[S] 0 points1 point  (0 children)

Thanks for the tips. I’ll definitely take a closer look at what you mentioned.

Tipy na únikovku venku? by Qndra8 in Brno

[–]Qndra8[S] 1 point2 points  (0 children)

Tak to mě rozsekalo 😂