Forgot your password?
typodupeerror

Comment How much is due to the fraud economy? (Score 0) 129

How much of the growth in these upper income households is due to the widespread fraud that's been going on in homeless services, migration services, Medicaid/MediCal, hospice care, autism care, etc., etc. ? Frankly, these are new 'industries' that only showed up in the last 20 years or so so they could, sadly, play a significant role in this otherwise positive trend.

Comment Why no whitelisted proxy? (Score 1) 86

Why are they not running all outbound internet traffic for personnel through domain-whitelisted, ssl-inspecting web proxies? This app wouldn't be able to connect to its cloud services at all if they were doing that. What a reckless network security architecture they've deployed on these military assets. I'm stunned.

Comment Apple getting better (Score 1) 329

This one is more repairable than other macbooks with keyboard being separate from the case and the battery being easier to remove/replace. However, it's only got 8GB of integrated RAM, so it's a super fast and better Chromebook but not something a tech-native can really use. But it might be a sign of better things to come for future macbooks in terms of repairability and battery replacement. fingers crossed.

Comment Re:Stupid idea (Score 1) 79

...With your approach, the website knows who you are, knows what kind of porn you watch, because your identity is tied to your web browsing, and can take advantage of that to show very specific targeted porn ads for you when you visit other websites, can use it to extort you, etc.

Mandating an approach like that would violate California's constitutional right to privacy, and any OS vendor or website that tried to do it that way could be held civilly or criminally liable.

No, with my approach the user would get bounced over to their chosen age verification provider (their bank), they'd authenticate, then the bank would give them an auth token signed by the bank with a claim that says they are '18 or over' and that's it. No name, no address, no nothing EXCEPT that they are indeed a legal adult. The browser would present that token to the over-18 only website which could verify the digital signature on it and trust the claim in it and let them in.

Comment Stupid idea (Score 4, Interesting) 79

What a brain-dead idea to put the age-verification into the operating system. It's gonna have to rely on some external service for the verification anyway, so is this mandate to just require that the OS has a secure local cache for this information it obtains from an external source? At times the device will not have Internet access, so that's the only way to make it work. This whole identity-verification discussion that's been going on for years is incredibly stupid anyway. There's a very simple fix for it everyone with a thimble full of imagination can realize which is that our banking system already has to do (in-person) identity verification. So it would be dead simple to just make the major banks provide OpenID or SAML type ID verification services that could be utilized by websites or operating systems. Take your kid to the bank with their birth certificate and social security card and get them a bank account and establish their authentication methods. Done.

Comment Unconstitutional orders? (Score 0) 29

That's rich coming from the batty boy of the unelected, unaccountable establishment elites. His entire existence is predicated on him doing whatever the CIA, etc. want him to do for them or OpenAI would still be a non-profit!

Unconstitutional orders? We didn't see you, Sam, taking on the censorship state when they wanted OpenAI to censor and propagandize! How "constitutional" is it for the state to censor what they decide is "harmful", "misinformation", "malinformation" or "hate speech"? It's 1000% Unconstitutional because we have this little thing called the 1st Amendment!

Comment generally dangerous (Score -1) 149

"generally safe"? If public health experts think mRNA vaccine tech is generally safe, they can't think straight. Given the way our immune systems work, it's generally UNSAFE to make all sorts of critical tissues and organs in your body produce a protein or structure you want your immune system to lock onto as a pathogen because your immune system can easily get (permanently!!) programmed to attack your healthy tissues and organs (and we know that happens).

Wake up propagandized morons...you are cattle to the elites. They will tell you any line of BS to make money off of you regardless of the consequences.

Comment Is it the food or the preservatives? (Score 1) 299

We don't even know at this point if the health impacts caused by ultra processed foods are from the ultra processed food or if it's the preservatives/additives they contain which kill/affect the gut microbiome which then causes the health impacts. It might be nice to know which one it is.

Like maybe some studies that add preservatives/additives to a whole/unprocessed food diet and see if you get the same negative health impacts? That might tell us it's more about the preservatives/additives (which are anti-microbial) and less about the food.

This is similar to the carnivore diet thing. Ketosis is great, yes, but do we know if it's just the ketosis (and fewer allergens going in), or if it's also the changing of the balance of power in the gut by feeding the meat microbes and starving the non-meat microbes (that live off of sugar and starches, etc.) that is the source of some of the "miraculous" benefits?

Comment They're unencrypted at the endpoint (Score 0) 26

Notice how the official response of Meta isn't "we can't and aren't looking at people's WhatsApp messages" it's basically "the end to end encryption is real people!" (strawman). We know the e2e encryption is real, but that's not the issue!

Since the messages are unencrypted at the endpoint, the app just needs to have an api that HQ can call and make the app search or return the unencrypted content to HQ. It's quite simple and doesn't mean the encryption isn't end-to-end. Just go to one of the ends to get the cleartext data. Duh.

If this is what Meta is doing, then it's kinda similar to how the Apple CSAM detection features work. They don't send your photos to HQ or violate the e2e encryption of your iCloud data (if you turned that on), they just have the endpoint (phone) do the detection on the images and send back object ids to HQ.

Slashdot Top Deals

Established technology tends to persist in the face of new technology. -- G. Blaauw, one of the designers of System 360

Working...