Raw LLM Responses

Inspect the exact model output for any coded comment.

Comment
> A new Android malware dubbed NoVoice exploited known vulnerabilities to gain root access I'm pretty sure in some cases it's easier to gain root access by making a malware than by being a legitimate user. > An encrypted payload (enc.apk) hidden inside a PNG image file using steganography is extracted (h.apk) and loaded in system memory while wiping all intermediate files to eliminate traces. Totally normal behaviour for an application. > Because that part of the device’s storage isn’t wiped during a factory reset, the malware will persist even after an aggressive cleanup. A watchdog daemon runs every 60 seconds to check the rootkit’s integrity and automatically reinstalls missing components. If checks fail, it forces the device to reboot, causing the rootkit to reload. Wow this one was quite nasty. > Users should always install the latest security updates available for their device yeah well perhaps you should maintain security updates for a longer time, many people buy used / refurbished phones, or are still able to use their phone for a long time after security updates end.
reddit Viral AI Reaction 1777072649.0 ♥ 35
Coding Result
DimensionValue
Responsibilitynone
Reasoningunclear
Policyunclear
Emotionindifference
Coded at2026-04-25T08:33:43.502452
Raw LLM Response
[ {"id":"rdc_oi3rbe0","responsibility":"none","reasoning":"unclear","policy":"unclear","emotion":"indifference"}, {"id":"rdc_d3rjmla","responsibility":"government","reasoning":"consequentialist","policy":"unclear","emotion":"outrage"}, {"id":"rdc_d3sdqxh","responsibility":"none","reasoning":"mixed","policy":"unclear","emotion":"mixed"}, {"id":"rdc_d3s8u8m","responsibility":"none","reasoning":"unclear","policy":"unclear","emotion":"resignation"}, {"id":"rdc_d3r9j3s","responsibility":"government","reasoning":"deontological","policy":"regulate","emotion":"outrage"} ]