• 1 Post
  • 50 Comments
Joined 1 year ago
cake
Cake day: August 16th, 2023

help-circle


  • That isn’t sufficient for the people trying to pass these laws. They’re trying to get the government to enforce parental controls, not the parents. Those types of controls already essentially exist and yet they were deemed insufficient.

    This is mostly because these people are not interested in protecting children, but rather shutting down anything they don’t like. The same way they tried to shut down abortion clinics by attempting to hold them to full blown hospital building standards. It wasn’t because it was unsafe, it was a way to harass the clinics they disapproved of.


  • I thought the same until someone shared some additional insights with me.

    So basically for device verification to work, you have to prove to someone that you’re an adult, typically by linking your real ID. The problem comes from when you log in to a porn website and they try to determine you’re an adult by reaching out to that trusted 3rd party. Now even though the porn site doesn’t know who you are, only that you’re an adult, the ‘trusted verifier’ does know that you’ve visited the porn website. This makes that organization a huge security risk as it directly links your identity to visiting controversial websites.

    Who would you really trust with that info? Corporation or government, both have major risks to collecting that info. What happens when FL bans porn and starts targeting people they know have accessed it via this database? What happens when LGBT info is labeled ‘adult only’ and requires this tech to access, creating a database of potential ‘undesirables’?

    Once it’s created it’s absolutely positive that the data will be hacked and that the government will use this mechanism to target at risk groups.

    The difference between this and in person ID checks is one of data persistence. Bars and such things just look at your ID, but don’t typically log it in a database. Compiling a persistent database of every ‘adults only’ only action is just too risky.










  • greenskye@lemm.eetoProgrammer Humor@programming.devStealing?
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    2
    ·
    3 months ago

    Both sides are twisting words. Pirating truly isn’t stealing, but rather closer to unauthorized use. The word ‘steal’ is used because they want to imply that it’s the same thing as taking a physical thing that can be lost. It engenders a certain feeling that they’re wanting to invoke. Stealing sounds worse than unauthorized use. Doesn’t mean it’s not wrong to do, but it isn’t the sort of wrong that they’re implying.


  • My introduction was the old Call to Power game. Still waiting for a Civ-like game that has a near-future age of gameplay. That was always the coolest part to me.

    Feels like most of the similar games today are either historical/current or purely scifi. I like the transition point. To play out possible ways of advancing forward. How do we get from today to entering the stars? Those were fun scenarios to play out.

    There’s a couple of mods for civ that covers this I know, but they’re all abandoned and somewhat buggy these days. Plus this sort of thing works best if the game is balanced around it to begin with.



  • Same. I originally got it for YT music. I don’t listen to as much music as I used to without a commute anymore, but my wife and I watch a ton of YouTube. And it’s mildly more difficult to block ads on the Roku too. I know pi holes exist, but my wife plays those freemium games that give you currency for watching ads and blocking all ads will break shit for her and then I have to fix it. Someone will tell me there’s an easy solve I’m sure, but honestly the subscription is just way easier and I really don’t mind paying. $16/mo for a family plan is 100% worth it to just not deal with all of that.