Comment Directive 4 (Score 1) 29
Do these people really think they're hiding Directive 4 from us?
Do these people really think they're hiding Directive 4 from us?
We are only a year out from the murder of a health-insurance executive, so the police are more on edge than usual.
Then we need to threaten such things much more often, so that the cops will eventually get used to it, and relax.
Debian never tried to kill me through my computer. I'd appreciate it if my car manufacturer made their car as safe as my computer.
Fuck it, I just want a Debian car. Then I won't need to extract bloody vengeance from beyond the grave, as my zombie revenant tracks down the CEO of Subaru, and the rotting flesh of my hands tightens around his throat as payment for the time a popup distracted me.
Some people are busting out "definitions" of "End to End Encryption" but people were already using that as in informal descriptive term long before your formalized technical jargon was made up. Nobody should be surprised if there are mismatches. Have faith in our faithlessness.
I personally view the term as an attempt to call semi-bullshit on SMTP and IMAP over SSL/TLS. In the "old" (though not very old) days, if you sent a plaintext email (no PGP!), some people would say "oh, it's encrypted anyway, because the connection is encrypted between your workstation and the SMTP server, the connection from there to some SMTP relay is encrypted, the connection from there to the final SMTP server is encrypted, and the recipient's connection to the IMAP server is encrypted."
To which plenty of people, like me, complained "But it's still plaintext at every stop where it's stored along the way! You should use PGP, because then, regardless of the connection security, or lack of security on all the connections, it is encrypted end to end. Never trust the network, baby!"
Keep in mind that even when I say that, this is without any regard for key security! When I say E2E encrypted, it is implied that the key exchange may have been done poorly/incorrectly, mainly because few people really get to be sure they're not being MitMed when they use PGP. You can exchange keys correctly, but it's enough of a PITA that, in the wild, you rarely get to. You usually just look up their key on some keyserver and hope for the best. Ahem. And I say "usually" as if even that happens often. [eyeroll]
Indeed, every time I hear about some new secure messaging app/protocol, the first thing I wonder is "how do they do key exchange?" and I'm generally mistrusting of it, by default. And sometimes, I'm unpleasantly unsurprised, err I mean, cynically confirmed.
But anyway, if my E2E definition matches yours, great! And if it doesn't, well, that's ok and it's why we descend into the dorky details, so that we can be sure we're both talking about the same thing.
How many hours of an Asian font designer'(s) time can you buy for $20k? It'd be funny, if it turns out that firing the font company pays off in less than a year.
If i was considering buying Dell in the future I sure as hell ain't now.
But George Soros amirite folks?!
I am seriously confused about the rationale here.
You thought Dell was a good fit for your next purchase. You've done some research, and Dell appears to have met your needs for quality and price.
The owners of Dell pledged $625 billion to a system that should help children in various ways. There have been a lot of complaints recently from young people about how the system has failed them: housing is too expensive, not enough high paying jobs, they can't afford to get married, own a home, and have kids.
This donation seems like it would be a start towards fixing this. Perhaps other high-end donors will add to the accounts.
Having an easy way to add to your children's future over time seems like it would help fixing this, it's simple and a "no brainer" for parents: they don't have to learn financing or do research or set up accounts, everyone online will be analyzing the accounts and tell whether they are a good idea. Parents can focus on parenting and rely on expert analysis for whether this is a good idea.
And you are so miffed at this that... for some reason... you've decided to boycott Dell and spend your money elsewhere?
I'm completely at sea here. In what universe does your decision make sense?
Addendum: Looking over the edit page of this post, it occurs to me that there is a universe where "jacks smirking reven" is not a US citizen, and is just making troll posts to foment divisiveness in America. I've seen a lot of really funny news accounts (example) of political shitposters on X being from foreign nations. Are we in that universe?
And will Slashdot ever add the "account based in" feature?
(BTW, I'm from the US, I promise
There is zero value in some big scary climate risk number also being disclosed, because A that risk accounted for if you are studying the details anyway and does not help you make a rational decision, because it literally does not affect you beyond the places where it is already baked into the numbers.
If you don't care why the insurance is so expensive or unavailable (e.g. high risk of flooding) then maybe you also don't care about why the house's price is so high (e.g. nice location, good construction, etc). No need to even look at the house. Just treat the whole damn thing as an abstract exercise in numbers.
OTOH, some people might actually care about details. Maybe because they're considering living there?
Once again, Open Source is embarrassed and left behind.
mplayer and mpv still, after all these years, don't have a way to prevent things from working if the content origin happens to be Netflix. It just plays on, stupidly Just Working, instead of breaking the way that Netflix realized their users want it to break.
To be fair your link does say "designed to bypass internet filtering mechanisms or content restrictions", so it sounds like SSH, work VPNs, banking etc. don't count because they aren't designed to get around the porn filters.
You make sense, but there is nothing that is "designed to bypass internet filtering mechanisms or content restrictions" more than SSH and VPNs bypass internet filtering mechanisms or content restrictions, is there? Why would anyone ever design a tool to get around filtering and restrictions, when they can already do that with established mainstream tools such as SSH or VPNs?
I can't believe the bill is intended to never be applied to anything. If we do think it's written in such a way that it never applies, I don't think it'll be litigated that way. Once it's enacted, they're going to say it applies to something, and that something is going to be anything that is secure.
You didn't read the bill very closely.
I think I read it much more closely than you did.
Sec 2(a):
"Circumvention tools" means any software, hardware, or service designed to bypass internet filtering mechanisms or content restrictions including virtual private networks, proxy servers, and encrypted tunneling methods to evade content restrictions.
This is either intended to apply to something or never apply to anything. Do we agree that the text is intended to do something, to somehow cover some possible situation which might realistically come up? You don't think they just put this in there, but with the begrudging admission that it could not ever possibly apply, do you?
Assuming you're still with me there, please give an example of what kind of tool this defines as a circumvention tool. Surely you have something in mind.
The bill is about outlawing the distribution of p0rn, and a VPN is merely listed as an unlawful circumvention tool.
That might have possibly been the original intent several years of editing ago, but I do not see anything in the definition of "circumvention tools" which even tangentially relates to porn. Do you? I think porn is 100% irrelevant in this discussion.
What I'm getting at, is that there isn't a "porn version" of Wireguard or SSH or HTTPS. They're all the same, content-neutral. The bill either bans them all, or doesn't ban anything. If you take my above bolded challenge to name a circumvention tool that this bill does address, I'm going to take all of your arguments that you give for why the law does apply to your circumvention tool example, and I am going to successfully apply them to SSH and HTTPS. And I'll be exactly as correct as you.
The only way this bill doesn't restrict SSH and HTTPS, is if it doesn't restrict anything at all. Don't agree? Then name something it does restrict.
That wasn't *all* I said, but it is apparently as far as you read. But let's stay there for now. You apparently disagree with this, whnich means that you think that LLMs are the only kind of AI that there is, and that language models can be trained to do things like design rocket engines.
This isn't true. Transformer based language models can be trained for specialized tasks having nothing to do with chatbots.
That's what I just said.
This isn't a partisan issue
Sorry, but no one can ever really say something like that these days, and be believable. While it's true there's no classical left/right split on this issue, our classical left/right days are long over.
If Trump decides he opposes this, then you're going to see 90% of Republicans suddenly oppose it, and it'll become partisan.
So, before you tell me this is non-partisan, please explain how regulating AI will help criminals steal, preferably from the US Treasury. Because if this does not aid crime, then Republicans will be against it. They might not be against it now, but they're going to be.
Here's where the summary goes wrong:
Artificial intelligence is one type of technology that has begun to provide some of these necessary breakthroughs.
Artificial Intelligence is in fact many kinds of technologies. People conflate LLMs with the whole thing because its the first kind of AI that an average person with no technical knowledge could use after a fashion.
But nobody is going to design a new rocket engine in ChatGPT. They're going to use some other kind of AI that work on problems on processes that the average person can't even conceive of -- like design optimization where there are potentially hundreds of parameters to tweak. Some of the underlying technology may have similarities -- like "neural nets" , which are just collections of mathematical matrices that encoded likelihoods underneath, not realistic models of biological neural systems. It shouldn't be surprising that a collection of matrices containing parameters describing weighted relations between features should have a wide variety of applications. That's just math; it's just sexier to call it "AI".
vlnl bhoyr-rapelcgrqqnl vfgunl barlnl.
Sorry, everyone. My mistake. An ISP which tolerates its users using ssh or https would be liable for $250,000 per day, not $125,000 per day. I realize that in the time since I posted, many of you made the determination "oh, it's not so bad" and bought houses in Michigan, now to be blindsided by that fact that I negligently underestimated the cost by a factor of two. I apologize for the error.
If you push the "extra ice" button on the soft drink vending machine, you won't get any ice. If you push the "no ice" button, you'll get ice, but no cup.