Posted on

How to copy text from McGraw Hill Connect

McGraw-Hill’s Copy Prevention

Copying text from McGraw-Hill’s online accounting textbooks has long been prohibited, creating difficulties for students, including myself. Not only does this prevent offline reading, but it hampers studying and taking digital notes on practice problems as well.

While disabling website copy blocking through changing browser settings dom.event.clipboardevents.enabled to true was thought to be one workaround, McGraw-Hill employs JavaScript to achieve their copy protection. Fortunately, I have finally found a solution that does not require circumventing their copy prevention.


Introducing NormCap

I discovered NordCap, an OCR-powered screenshot tool, entirely by accident while browsing the featured category in the Gnome software store on my Linux system (Vanilla OS). Curious, I installed it to try it out.

NordCap allows users to copy text from a wide range of sources, not just images. It enables extracting text from online resources like McGraw Hill Connect as well as videos, photos, GIFs, and essentially any content displayed on the screen.

Instead of capturing images, NordCap is able to detect and extract the text. As shown in the GIF below.

NormCap Demonstration GIF

Step-By-Step Guide

  1. You will need to download and install NormCap via https://dynobo.github.io/normcap/
  2. Start NormCap, a pink border will appear after the permissions have been given by the user
  3. Select the region of text you wish to copy, the text is now copied
  4. Paste the text anywhere or press Ctrl+V to paste from clipboard
  5. Done!

Note: Settings can be accessed by starting NormCap or pressing Capture in the tray icon while NormCap is running, Settings will be located in the top right of the screen as of v0.4.1


NormCap Usage

NormCap provides a free and open source tool for students to capture notes and problem sets. Once NormCap is installed and configured, it enables students to easily copy down assignments and materials to review and study. NormCap offers this functionality without any ads, allowing students to focus on their coursework.

Posted on

How to Connect to CU-Resident Wi-Fi

Getting connected to Wi-Fi at CU may seem straightforward, but the process can be intricate, similar to connecting to a printer here… This guide will walk through the steps to connect your device to the CU-Resident Wi-Fi network and enable extra security using the free quad9.net DNS service. It’s recommended to connect to a Wi-Fi network as “CU-Guest” is heavily bandwidth limited, meaning on average on CU-Guest you would normally get 10mbps while on “CU-Resident” you can achieve speeds on average of 100mbps. Though, if you add a custom DNS through quad9.net you can achieve speeds well over 100mpbs, while increasing privacy and security of your devices.

CU-Resident only allows on campus residents to log in to register their devices.

Registering a Device (Required)

Although registering a device may seem complicated, this guide simplifies the process and makes it straightforward. The only requirement is that you have a device already connected to the network, which can be either CU-Resident or Cornerstone.

  1. Visithttps://clearpass.cornerstone.eduNote - If you are not connected to either CU-Resident or Cornerstone, the site will return an error "We can’t connect to the server at clearpass.cornerstone.edu."
  2. Login – to clear pass by using the following format Username is "first initial, followed by a 0, then ID number" example “a0123456”. Password is your Microsoft account password.
  3. Click"Guest Management" located under "ClearPass Guest"
  4. ClickAdd Device located on the right near "List Devices" and the "Logout" button.
  5. Add – a "Device Name", it’s recommended to not personally identify the real device. I would put device 1, device 2, device 3, etc. This increases privacy a little bit.
  6. Add – the "Mac Address" of the device, this can be found in various places on a variety of devices. I recommend to lookup on YouTube, “How to find mac address for (blank product)”Apple Products - Settings → General → About → "Wi-Fi address"Windows - Settings → Network & Internet → Ethernet or Wi-Fi → Select the connection → Properties → "Physical address (MAC)"Linux - Open Terminal/Console → Type and enter "ip link" → Mac address → Mac address will be listed after "link/ether"
  7. Press"Create Device" once you have entered your device’s Mac address, be sure to leave "Enable AirGroup" blank.Note - CU only allows 3 devices to be connected to one account, meaning you can only have 3 devices registered per account.

Connecting a Device (Required)

Once you have completed all the steps to register your devices, you can now simply connect to "CU-Resident" as you would with any other Wi-Fi network. I do highly recommend setting up quad9 as a custom DNS with the instructions below, but it’s only optional.

This is an optional step but is highly recommend as not only does it give your devices more security and privacy, but it could increase Wi-Fi speed quite significantly. Based on my tests alone, it allowed a number of my friends to download/update various PlayStation games well over 50 GB’s in less than 10 minutes. Since quad9 is relatively a big non-profit organization, they have crafted a handful of guides made per devices and operating systems.

https://quad9.net/support/set-up-guides

While I highly recommended adding quad9 to your devices simply due to it being a trustworthy non-profit organization, and it’s free. If you are looking for a secure and fast VPN, I recommend either ProtonVPN, Mullvad or IVPN. Although I have a custom code for "Proton Mail Plus" as they are allowing me to give away one month of Proton Mail Plus completely free. Which gives you access to many perks including a secure and private VPN.

Free One Month of Proton Mail Plus Click Here

Note - If you are connected to CU Wi-Fi, they block any website name with the words "VPN" due to VPNs having the capability to unblock all network restrictions on their censored networks.

Posted on

Bypass Safe Exam & Lockdown Browser

What is Safe Exam & Lockdown Browser?

Lockdown browser and Safe Exam Browser (SEB) are software applications designed to enhance the security of online exams by restricting access to certain features and websites. Lockdown browser is a proprietary program developed by Respondus, while SEB is an open-source software supported by a community of developers. Both applications prevent students from accessing external web pages, copying and pasting information, taking screenshots, or using other programs during an online exam. In addition, SEB allows instructors to set specific exam configurations, such as disabling certain keyboard keys or requiring a webcam to monitor the exam-taker. Lockdown browser and SEB provide a secure and reliable way to administer online exams, ensuring academic integrity and minimizing the risk of cheating.

These software programs are malicious, here’s why…

These applications act as malware, as they install themselves as browser extensions or software onto users’ devices without their explicit consent. Moreover, these applications track users’ activity and collect personal information, which could be a violation of their privacy. Even when an exam is not in the process of being taken. They have a system process that runs 24/7 in the background that cannot be shutdown due to it having a recurring startup process. Meaning, if you were to quit the process via task manager it’ll just start up again, which is exactly what malware does…

Bypass Introduction (Educational Purposes Only)

Let me begin by emphasizing that the following information is intended solely for educational purposes, and I strongly discourage any use of it for academic dishonesty. If you are a student who is hesitant to install these software programs on your personal device, I recommend informing your dean. They should be able to address your concerns by providing you with a school device. If they are unable to do so, simply inform them that you use Linux, as these software programs are not fully compatible with the Linux operating system.

How to Bypass

If you dive into the core functionality of how these software programs work. You will quickly come to realize they are relatively simple pieces of software that are easy to circumvent. In none technical terms, they run with elevated permissions on your operating system. Think of a work environment chain which follows as such employee → management → owner, it’s quite obvious management has more permissions than a typical employee and the owner has the most permissions. In our case these software programs are the managers while any other software on our system is just an employee. Meaning, if we want to circumvent these software programs, we have to make them either have an equal amount of permissions on our operating system or make them have more permissions than a typical manager. With this information now you should be able to come up with a quick and easy bypass to efficiently circumvent these software programs, but if not. I have my bypass available for purchase below for experimental and educational purposes only!

My Bypass

I have created a bypass that is quite unique as it’s fully undetectable to all root level safe exam & lockdown browsers. It works on all operating systems including Windows, macOS & Linux! My bypass allows the full use of any desktop applications, including remote access to the machine that is locked down. You heard right, full remote access. I understand many individuals might not want to purchase this bypass from me as who would even want this, but I’ve had a surprising number of individuals reach out waiting for this post. As I know this isn’t the traditional way of shopping, it’s going to be the way. I do things as if you want it, you will get it cause it works every time.

How to Purchase

Purchasing is very simple for those willing to acquire.

SEB Bypass Shop Product

Acquiring Monero

Although Monero might be new to you, It’s very easy to acquire. There are multiple ways to acquire Monero which can be found on getmonero.org.

My Recommended Way:

https://www.kraken.com/learn/buy-monero-xmr

Posted on

Free One Month of Proton Mail Plus

What is Proton?

ProtonMail is an end-to-end encrypted email service based in Switzerland. It was founded in 2014 by a group of scientists from CERN and MIT who were concerned about online privacy and security. ProtonMail is designed to provide secure and private email communication, with features like end-to-end encryption, two-factor authentication, and self-destructing messages. The service is available as a web-based application and as mobile apps for iOS and Android. ProtonMail has gained popularity among users who are concerned about their online privacy and want to protect their communications from surveillance and hacking. Proton aims to offer an honest and reputable email service by upholding themselves above industry standards when compared to other companies such as Gmail, Outlook, and Yahoo. Who sell their customer’s data (emails) to advertisers to get targeted advertising. This is also why many government officials host their own email server.

Proton Mail Reputation

Proton Mail holds a very high reputation as they are not only rooted in Switzerland a neutral country, but they have been around since 2014. Proton also keeps all their services open source, which is when the background code of products is publically available for anyone to look at. "Transparency is the only way to earn the trust of our community"Proton. In which this transparency has earned the communities trust, at the time of writing this post for access to my exclusive code for one month of Proton Mail Plus. PrivacyGuides.org as ranked this email provider the best for all around security and privacy.

Proton Code

Free One Month of Proton Mail Plus Click Here

The free exclusive promotional code is linked above. This post isn’t a paid advertisement, but rather one of just sharing to display there are better products than mainstream email providers out there. Just cause your email provider that you use or maybe this is your first email, you’re about to create is free doesn’t mean it’s something to trust. As free in the digital era means you are paying for your data. Having a secure and reliable email is the same as having a secure and reliable bank. Your email in today’s day in age is your digital bank for all things including personal finance, social media, careers, and even government documents. So why wouldn’t you want that stuff to be encrypted? I personally use this email since transitioning from Yahoo back in 2017, and it’s been great. As I have mentioned previously, this isn’t a paid review. As I have to pay for it with my own money.

Proton Mail Plus Features

Proton Mail Plus includes many features by default such as email encryption (OpenPGP), data security (zero-access encryption), account security (TOTP – two-factor authentication), and all the features listed below.

Fun fact is Proton is one of the few email providers that still accepts cash by mail

Proton Mail:

  • 15 GB total storage
  • 10 email addresses
  • Unlimited messages
  • Support for 1 custom email domain

Proton Calendar:

  • 20 Calendars
  • Calendar sharing

Proton Drive:

  • Automatic sync
  • Encrypted file sharing

Proton VPN:

  • 1 medium-speed VPN connection
Posted on

GPT-4 vs AI Detection

GPT-4

"GPT-4 can solve difficult problems with greater accuracy, thanks to its broader general knowledge and advanced reasoning capabilities." – OpenAI

GPT-4 Test

In this test I’ll be using Poe AI to access GPT-4 for free as currently at the time of writing it is a paid GPT model.

GPT-4 Initial Prompt

The initial prompt is as follows

Explain quantum computing in simple terms with high perplexity and burstiness in your tone of writing. Write at college level with an writing style of a professor.

GPT-4 Response

The response by GPT-4 is as follows

Ah, quantum computing! A veritable cornucopia of enigmatic conundrums and tantalizing paradoxes, nestled within the realm of the infinitesimally minuscule. Let us embark upon a journey, my dear intellectual companions, to explore the confounding depths of this wondrous domain.

Picture, if you will, the classical computer: a binary behemoth, churning out calculations with unyielding adherence to the 0s and 1s - the bits, as it were. A tale as old as time, or at least as old as the venerable Mr. Turing and his groundbreaking escapades. However, the quantum world scoffs at such simplistic binary constructs, choosing instead to embrace the enigmatic qubits.

Ah, the qubit! A mercurial protagonist in this grand narrative, dually embodying both 0 and 1 in a superpositioned waltz of mathematical probabilities. How does one even begin to fathom such a concept? Perhaps Schrödinger's mystified feline can offer us a clue, forever trapped betwixt life and death in its unobserved quantum dwelling.

Now, enter the quantum computing stage: a cacophony of entangled qubits, their fates inextricably intertwined like a cosmic dance of interstellar ballerinas. The sheer magnitude of computational prowess unleashed by these enigmatic entities is nothing short of breathtaking. The powers of parallelism are harnessed to perform unfathomable feats, solving problems in mere moments that classical computers could only dream of conquering in millennia.

But lo! The path to quantum supremacy is not without its pitfalls and perils. For the act of observing these capricious qubits invariably collapses their probabilistic waveforms, like a fragile soufflé deflating under the harsh gaze of an overly critical chef. The delicate art of quantum error correction, therefore, is of paramount importance, lest our dreams of quantum nirvana dissolve into a cacophonous cacophony of computational chaos.

In conclusion, my esteemed colleagues, quantum computing is an enigma wrapped in a paradox, nestled within the heart of the infinitesimally small. It stands as a testament to human ingenuity, challenging our very understanding of reality and pushing the boundaries of what is computationally possible.
GPT-4

GPT-4 AI Detection

The AI detection of choice for this test will be GPTZero as they claim to be "The World's #1 AI Detector".

GPTZero Result

Results

GPT-4 blows any AI Detection out of the waters. GPT models will continue to bypass AI detectors due to how hard it is to predict text being AI generated. If you want to get free access to GPT-4 consider downloading Poe AI which is the app I’ve used for this testing, you can also visit poe.com

Posted on

Transvribe – Educational AI for Youtube

Introduction

Transvribe is an AI-powered tool built by Zahid to help users learn more effectively on YouTube. With its powerful AI embeddings, Transvribe makes it easy for users to search for any video and quickly find the information they need.

Transvribe allows users to paste a YouTube URL and start asking questions. This makes it easier than ever to get the answers you need and learn more effectively. While cutting down on time for those long TED talks that you might have to take notes on.

Get Started with Transvribe

To get started with Transvribe, simply visit the website.

Transvribe.com

From there, you will need to paste the URL for the video, then you can begin asking questions, and taking notes right within the platform.

Posted on

How to Convert PDF’s to Images with GIMP

Introduction

Sometimes you may need to convert a PDF to an image PDF, which is a PDF file that contains images instead of text displayed over images. This can be useful for a variety of reasons, such as when you want to preserve the formatting of the original PDF or when you want to share the PDF with others who may not have the same fonts installed on their computer. This can also be used to prevent getting falsely accused of plagiarizing with AI software, more info on that topic can be found here.

Fortunately, GIMP, the popular open-source image editing software, can be used to easily convert a PDF to an image PDF. Here’s how to do it:

Instructions

Install GIMP

First, you need to have GIMP installed on your computer. If you don’t have it already, you can download it for free from the official GIMP website: https://www.gimp.org/downloads/

Open the PDF File in GIMP

Once you have GIMP installed, open it and go to "File" > "Open" to open the PDF file you want to convert to an image PDF.

Import Pages as Layers

GIMP will show a dialog box asking you how you want to import the PDF file. Choose the "Open pages as Layers" option, and click "Import". GIMP will then import each page of the PDF as a separate image. You can view these images by clicking on the Layers tab on the right-hand side of the screen.

Export as PDF

To export the images to an image PDF, go to "File" > "Export As". In the "Export Image" dialog box, choose a location to save the image PDF file, and give it a name. Under "Select File Type", choose "PDF" from the drop-down menu. Click on the "Export" button to convert the images to a PDF.

Choose PDF Export Options

In the "Export Images as PDF" dialog box, make sure the "Layers as pages (bottom layers first)" option is selected, and click "Export".

Save the Image PDF File

GIMP will then save the image PDF file to the location you specified. You can now view and use the image PDF file just like any other PDF file.

That’s it! With these steps, you can easily convert a PDF to an image PDF using GIMP. Converting a PDF to an image PDF can be a useful skill to have, especially if you work with PDF files frequently. Give it a try and see how it can benefit you!

How does Turnitin react?

Many people ask, How does Turnitin react to PDFs that are made up of images? Well it simply doesn’t, Turnitin can’t scan text in images they can only scan text on images. Upon submitting your PDFs made up of images to Turnitin, you will likely be prompted with this result.

Turnitin Result

In order to see the displayed messages on a Turnitin submission, you must hover over the "x" with your mouse cursor

Posted on

Sitemaps – Your Guide to Better Website Navigation and SEO

Sitemaps

Sitemaps are files that contain information about pages, videos, images, and other types of content on a website. They serve as a blueprint of the website’s structure and provide information to search engines like DuckDuckGo, Google, and Bing to help them crawl and index the site more efficiently. Sitemaps also provide additional information about the relationships between pages and which ones are most important. There are several types of sitemaps, with the XML format being the most versatile and widely supported. Basically, sitemaps are the navigation map for search engines.

Why Do Sitemaps Matter?

Sitemaps are an important aspect of SEO because they provide search engines with information about the structure and content of a website. By submitting a sitemap to search engines, website owners can ensure that all pages of their site are indexed and crawled by search engine bots, which can lead to improved visibility in search engine results pages (SERPs).

Sitemaps also help search engines bots understand the hierarchy and relationships between pages on a website, which can help with the overall crawling and indexing process. This can be particularly important for larger sites or sites with complex navigation, as search engine bots may not be able to discover all pages through normal crawling methods alone.

Additionally, sitemaps can provide additional information about the content on a website, such as the date of last modification, the frequency of updates, and alternate language versions of pages. This information can help search engines better understand the context and relevance of the content on a site, which can ultimately improve the site’s ranking in search results. If you decide to not use sitemaps, do keep in mind that popular search engines might rank your site down in the SEO chain simply due to not having a sitemap submitted.

Google Search Console Guide

Uploading your sites, sitemap to Google’s Search Console is rather easy. All you have to do is navigate to https://search.google.com/search-console/welcome

  1. Log in to your Google Search Console account. If you don’t have an account yet, you can create one for free by following the instructions on the Google Search Console website.
  2. Once you’re logged in, click on the website for which you want to submit a sitemap.
  3. In the left-hand menu, click on "Sitemaps".
  4. Click on the "Add/Test Sitemap" button in the top right-hand corner.
  5. Enter the URL of your sitemap into the text box. Your sitemap URL should be in the format of https://www.yourwebsite.com/sitemap.xml.
  6. Click "Submit". Google will now start to crawl your sitemap and index the pages on your website.

By submitting your sitemap to Google Search Console, you can ensure that your website is being properly crawled and indexed by Google, which can help to improve your search engine rankings and visibility.

Bing Webmaster Tools Guide

Uploading your sites, sitemap to Bing’s Webmaster Tools is also rather easy. All you have to do is navigate to https://www.bing.com/webmasters/about

  1. Log in using your Microsoft account.Note, if you have a Google's Search Console account and the sitemap is submitted on Google's Search Console. You can skip all these steps and just sync your account to your Bing account for Bing's Webmaster Tools.
  2. If you haven’t already added your website to Bing Webmaster Tools, click the "Add a Site" button and follow the prompts to verify ownership.
  3. Once you have your sitemap ready, go to the "Sitemaps" page in Bing Webmaster Tools. Click the "Submit a Sitemap" button and enter the URL of your sitemap.
  4. Bing Webmaster Tools will ask you to verify your sitemap. Follow the instructions to verify your sitemap.
  5. After you have submitted your sitemap, Bing will crawl and index the pages in your sitemap. Monitor your sitemap regularly to ensure that Bing is able to access your pages and that there are no errors or issues with your sitemap.

Remember that submitting a sitemap to Bing Webmaster Tools is just one part of an effective SEO strategy. You should also focus on creating high-quality content and building high-quality backlinks to your website. Alternatively, if you have a community to interact with they are by themselves good marketers as usually you find with communities. Members of that community create quality backlinks which give you completely free organic results to your website. An example of this situation can be found below.

On February 19, 2023, I posted a case study on the very popular AI Detection program called GPTZero. This case study labeled “GPTZero Case Study (Exploring False Positives)” blew up overnight and was posted by a community member to Ycombinator News, which received hundreds of comments and thousands of views. Here’s the thing that really displays the power of the community. Ycombinator News isn’t just one website, it’s distributed amongst various social media platforms such as Twitter, Reddit and various news organizations including Flipboard. That means once this post made it to the top of Ycombinator news, literally number 1 on the whole site. It was cross posted to Twitter, Reddit and various news sites. It even made its way to Flipboard on various topics. Now, since all these other platforms carry very high SEO rankings, it only boosted my site’s SEO ranking up more. Overall, this is why no matter what business industry you’re in, it’s important to interact with your community as they are the ones you will only bring you more business.

Mwmbl Search (Advanced Users ONLY!)

Mwmbl search is a rather new & under current development. Although, since, I wanted my website to be indexed on this non-profit search engine. I started looking into how I could crawl my own website. When I say this is a tutorial for advanced users, I really mean it, as we are going to be using a terminal window and GitHub.

For the duration of this tutorial, I will be using VanillaOS a Linux based operating system. Meaning my commands to interact with the terminal might be different from your own operating system, though the steps remain the same.

  1. Open Console or Terminal
  2. Enter an Ubuntu managed container by typing "apx enter" and press enter
  3. After you have cloned the crawler-script simply CD into the repo "cd crawler-script"
  4. Enter poetry shell by typing "poetry shell"
  5. Once you have been loaded into poetry shell, lastly type your website as follows "python main.py -j 3 -u https://yourwebsite.com --site https://yourwebsite.com"
Posted on

ChatGPT for Google Slides

AI Generated Google Slides

MagicSlides App is an AI-powered Google Slides extension that allows users to generate full Google Slide presentations with just two key pieces of information. Just provide title, Number of Slides and some additional text which you want included (optional) and click generate and done!

Installation:

Go to installation page

Click on the Install button

MagicSlides App

Click on Continue

MagicSlides Requesting Permission

Select your Google account

Selecting An Google Account

Allow the requested permissions

MagicSlides Google Account Access

Done!

MagicSlides Installed
Posted on

GPTZero Case Study (Exploring False Positives)

Introduction

In this case study, I will be sharing the vast amounts of false positives current AI detection software gives, specifically for this case study I will be demonstrating GPTZero. I personally want to thank the supposed “Healthcare professional” who brought this to my attention via my contact link. It has motivated me to look more into this issue rather than just posting bypasses to these popular AI detection software programs, it will be only more beneficial to highlight their real usability in general.

What is GPTZero?

GPTZero is a tool that uses certain characteristics of AI to identify when AI is being used. It looks at things like how difficult it is for the AI to understand certain words or phrases, and uses this information to tell if the AI was involved in creating a piece of text. It’s like a “fingerprint” for AI, that can detect when it has been used.

The False Positives

From my own testing before even thinking about writing this case study on GPTZero, I have found that GPTZero gives very mixed results while OpenAI’s AI Classifier is usually more consistent but less informative about what is AI written and what is human written. After testing the medical paper on "Severe Outcomes Among Patients with Coronavirus Disease 2019 (COVID-19) — United States, February 12–March 16, 2020"Source

GPTZero states that more than 50% of this paper is AI written, and keep in mind this is only the first paragraph taken from the paper. Considering this is an official medical paper and that was written in 2020 by Multiple CDC Contributors. It’s not AI written, it’s quite obvious this is a false positive.

Note: Even after testing the maximum amount of words (5,000 characters) against GPTZero, the false positives still scored above 50%

GPTZero Result

Thank you to the supposed "Healthcare professional" for sharing this link

Pie Chart

The following pie chart follows these rules below.

  • All papers tested will be under the “neurology” topic
  • All papers that are flagged as AI or low perplexity counts will be marked as false positive
  • All papers abstracts will only be tested

The Results are shocking, as GPTZero marks 11 of the 20 medical papers as having AI written portions. Keep in mind, I only tested the abstracts of the papers.

GPTZero False Positives

Pie Chart Resources

False Positives:

Positives:

Wayback Machine Screenshot Link

This screenshot serves as a representation of what order these medical papers where tested in. The order follows from 1 through 20.

https://web.archive.org/web/20230219025214/http://web.archive.org/screenshot/https://www.ncbi.nlm.nih.gov/pmc/?term=neurology

The Control (Baseline)

As a control for our case study, I will be using OpenAI’s (ChatGPT Parent Company) AI Classifier.

Note: OpenAI's AI classifier is a "work-in-progress"

The image below shows the first paragraph from the medical paper on "Severe Outcomes Among Patients with Coronavirus Disease 2019 (COVID-19) — United States, February 12–March 16, 2020"Source

OpenAI’s Classifier Result

"The classifier considers the text to be unclear if it is AI-generated." - OpenAI's AI Classifier

Due to this paper being published in 2020 and the academic level of this paper. It’s extremely unlikely this paper used any AI based software. We can actually do another test to insure with 100% certainty, this paper didn’t use any AI when writing by looking back at it’s archived links via Wayback Machine by Internet Archive.

According to the Wayback Machine from the archived link https://web.archive.org/web/20210823160148/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7725513/, dated (August 23, 2021). The wording has not changed since publication.

The Wayback Machine is a community based universal internet archive tool, that takes timestamped screenshots of the web. With the goal of perserving the web and it's content

OpenAI AI Classifier Limitations

“Current limitations:

  • Requires a minimum of 1,000 characters, which is approximately 150 – 250 words.
  • The classifier isn’t always accurate; it can mislabel both AI-generated and human-written text.
  • AI-generated text can be edited easily to evade the classifier.
  • The classifier is likely to get things wrong on text written by children and on text not in English, because it was primarily trained on English content written by adults.” – Source

The Problem

Having inaccurate reports on a software program that is about to go commercial is a big red flag and brings along many problems. Far too many problems to simply state in a single blog post. The biggest problem I personally can see it having and one that can relate to my life is plagiarism in the education field. If a student is wrongfully accused of plagiarism due to the institution following a flawed AI detection program, it could be detrimental to any student. At my institution, plagiarism carries a huge impact on your character. My university labels it as “Academic dishonesty, therefore, is a serious breach of university standards and will result in substantial penalties.”