Forgot your password?
typodupeerror

Comment Re:Children shouldn't be on social media (Score 1) 48

Unions are a real-life strategy because they work. Divide-and-conquer is also a real-life strategy, because it works too.

Thus, I think the truth of your statement all depends on whether you look at this conflict between government and the the people, from the point of view of the attacker, vs the point of view of the defender.

Comment Re:Children shouldn't be on social media (Score 1) 48

Children do not have the maturity that is required for unfiltered access to the adult world

But they used to. In the 1980s, nobody dared to say in public, that 17-year-old me should not be allowed to visit public (or even university) (or even medical) libraries. (Or if someone did, they were still very obscure and unpopular, little more than a glimmer in the left's eye.)

Comment Re:"Harmed by end to end encryption?" (Score 1) 48

If I may, could I narrow down which of these two things you think is best? First, there's exactly what you said above..

Kids have no right to use end-to-end encryption without parental consent

..but I've altered it:

Kids have a right to use end-to-end encryption unless denied by a parent

Did I make it better, or did I make it worse?

Comment Re:Children shouldn't be on social media (Score 0) 48

What we really need are proper support systems for children in place, but in the real world they often don't exist. Some parents also seem to think they should have full control over their children and know everything they are doing at all times, which makes things like seeking support for being LGBTQ bother difficult for the child and something that the parents demand is not made available.

Maybe we could set up better moderated communities for this kind of thing, but that brings its own problems. As an example, with the current attacks on trans healthcare in the UK, a lot of trans kids are being forced to go the "DIY" route for treatment. It's not illegal as such, but it is something of a grey area. Any kind of official moderation is likely to make such forums useless to a lot of people.

Comment Re:I read the book (Score 1) 58

Are you sure you were paying attention when you read it, because that's not what happens in the book. For example, Rocky needs essentially an environmental suit to survive in an atmosphere suitable for humans, due to his planet having much higher pressure and temperature. Communication is established over some time based on engineering principles, which are universal properties of the universe and a classic sci-fi trope for communicating with very different alien species.

I thought it was a pretty good book overall. Lots of interesting ideas and detail. Strong characters, at least for the protagonist and Rocky.

Comment Re:Looks like a robotic arm on a rail (Score 1) 53

The Chinese have these kinds of robots deploying much larger installations. They also have drones that fly panels into mountainous areas for installation.

Not that I'm knocking it, it's good that they are copying good ideas. The cheaper solar gets the better, and for political reasons stuff like this has to be home grown.

Comment Re:smug Linux user enters the chat (Score 2) 185

Had one just this week. Of course we were zapping a Raspberry Pi with 8,000V.

That's the reason why Windows has more crashes. Very varied hardware. I had an issue where sometimes the machine would fail to come back from sleep or hibernation, which turned out to be because sometimes the PCIe link training either failed or came up with a different result for the GPU. Setting the BIOS to force it to PCIe 4 fixed it. Similarly a friend had random crashing which was fixed by running his RAM slightly below rated speed.

Some people just have crap hardware too. Weak power supplies, failing drives, inadequate cooling.

Macs only do better because Apple tightly controls the hardware. Prebuilt Windows machines are probably similarly reliable, at least from people like Lenovo and maybe Dell.

Comment Re:Good! (Score 1) 46

Mostly just in the bulk, low barriers to entry, and pervasiveness(like a lot of things social media). The case of actors actually goes back a long way; state laws regarding compensation of child actors were spurred by the case of one who was popular in the 1920s and litigated with his parents over where the money wasn't in 1939. That case doesn't provide for takedowns; but it's also the case that filmmakers are normally looking for children to play characters; rather than to do 'candid' intense documentaries of them at home; so the degree of public exposure of private life is presumably deemed to be less; with the main issue being children who were...definitely...getting a solid education while on stage finding that all the money was gone when it became their problem.

Child-blogging, by contrast, seems to reward verisimilitude (if not necessarily truth) and invasiveness, relatively pervasive in-home mining for 'content', so presumably seems better served by removal-focused options; though there has definitely been talk about covering the economic angle in line with child actors.

I don't even know what the deal is with child beauty pageants, or how something you'd assume is a salacious bit of slander about what pedophile cabals are totally doing, somewhere, is actually a thing a slice of parents are into, way, way, into. Apparently that's a third rail to someone, though, as the only jurisdiction I'm aware of with significant restrictions on them is France.

Comment Re:The Horse is Already Gone (Score 1) 65

Unless quantum computing becomes cheap and comparatively widely available quite quickly after becoming viable passwords seem like they'll be a manageable problem. Nobody likes rotating them; but it's merely tedious to do and the passwords themselves are of zero interest unless they are still being accepted. If it does go from 'not possible' to 'so cheap we can just go through through in bulk' overnight that could ruin some people's days; but if there's any interval of 'nope, the fancy physics machine in the dilution refrigerator is currently booked by someone with a nation state intelligence budget' you can just rotate older credentials.

Now, if you were hoping that encryption was going to save any secrets that are interesting in and of themselves that got out in encrypted form; then you have a problem. Those can't be readily changed and will just be waiting.

Slashdot Top Deals

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...