• 2 Posts
  • 870 Comments
Joined 2 years ago
cake
Cake day: July 5th, 2024

help-circle
  • But I don’t see anywhere in this specific Colorado bill trying to restrict OS level features or go anywhere near open-source

    Because the people proposing the bill don’t understand or know what open source is.

    I guess my example “realization of open source” dialogue wasn’t in your face enough, eh?

    This is about a single signal (kid/no kid) at the user-auth level, without slurping up PII and shipping it off into the ether.

    You claim to be a developer, but seem to not understand the fundamental truth of “you can’t trust the user’s computer”. The proposed law, would make it law that operating systems have some mechanism to verify age. Now if it’s a law to guarantee the verification flag is available, then that would also mandate the mechanism be free from tampering, otherwise the law means literally nothing and is unenforceable.

    So once they learn about open source, root access, jailbreaking, etc, those things will very quickly become illegal.

    As I said in my other comment, this problem has been attempted with gaming client-side anti-cheat for decades now. There’s a reason most online games still are riddled with cheaters, despite anti-cheat software being near Orwellian in what they can do.

    Age verification is nothing more than the new guise of forced online tracking.


  • And I will tell you this: the operating system is 100% where you want to do age verification.

    Oh, what’s that you’re using? It’s Linux? Sure that’s fine, just make sure the age verification check works on it.

    Wait, what do you mean you have “root access”? Why do you keep repeating “it’s my hardware and I own it”? You removed the age check system? You can do that! Hey, he’s not supposed to be able to do that!

    Colorado proposes bill to ban open source operating systems

    As a parent, systems and web developer of both open source and proprietary software. This would single-handedly be one of the most damaging things to ever happen to the world of personal computing.

    From a technical point of view, having OS-level verification is the least worst, and in my technical opinion, the best option.

    It’s a horribly bad opinion. It’s the same old problem with client-side anti-chest. You can’t trust the hardware. If the user has full access to the computer, then they can do whatever they want with it. This is a core issue in security modelling. So what’s the answer? Try to lock down the system. This is why anti-cheat software, to play a video game, has more access to your computer’s hardware than you do as a user. Full access to every single file, data in memory, webcams, things on screen, etc.

    What’s going to happen if it becomes mandated that age checks must happen in the OS? We’re going to get computers so locked down that you won’t be able to open a .txt file without some kind of authentication check.

    No thanks. I’m happy to avoid every single age-check required service.


  • A mathematician in the 70s said, “hey what if this is how brains work?”

    If you really want to be pedantic, the modern concept of neural networks was invented decades prior.

    But in either case, ANN do follow the basic concept of how neurons work. That’s not even up for debate. Obviously biological neurons have way more going on, and there’s even evidence for “warm” quantum processing happening within each neuron in the microtubules. But the feed-forward signal mechanism is real, and ANNs are based on that concept.

    Except the Neural Net model doesn’t actually reproduce everything real, living neurons do.

    No idea what you’re saying here. But if I had to guess, you’re saying that “real brains, not artificial ones, create novel outputs”. And if that is what you meant, then congrats, you said nothing of value. The discussion was never about biological vs artificial neural network quality.










  • The quotes are because “AI” doesn’t exist. There are many programs and algorithms being used in a variety of way. But none of them are “intelligent”.

    And this is where you show your ignorance. You’re using the colloquial definition for intelligence and applying incorrectly.

    By definition, a worm has intelligence. The academic, or biological, definition of intelligence is the ability to make decisions based on a set of available information. It doesn’t mean that something is “smart”, which is how you’re using it.

    “Artificial Intelligence” is a specific definition we typically apply to an algorithm that’s been modelled after the real world structure and behaviour of neurons and how they process signals. We take large amounts of data to train it and it “learns” and “remembers” those specific things. Then when we ask it to process new data it can make an “intelligent” decision on what comes next. That’s how you use the word correctly.

    Your ignorance didn’t make you right.



  • CeeBee_Eh@lemmy.worldtolinuxmemes@lemmy.worldBeware
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    6 days ago

    The only time I’ve ever really had issues with Nvidia drivers is when installing the meta package for CUDA (because it tends to include a previous version of the driver, which causes install/uninstall havok), or with laptops and hybrid graphics.

    But the laptop issue is almost completely gone with newer distros like Bazzite.







  • The legal term is: unauthorized access to a computer system.

    No, the legal definition is this:

    In a legal context, hacking is a term for utilizing an unconventional or illicit means to gain unauthorized access to a digital device, computer system, or network.

    Source: https://www.law.cornell.edu/wex/hacking

    So this wasn’t illicit, because the FBI publicly published the data. So the argument has to be made with “unconventional”. This is what I disagree on.

    Think about it in any other way? So I’m just walking down the street… I see a house… I go open a door… I open the fridge. Make myself a sandwich. Then go to a bedroom that’s not mine. Put on some underwear that isn’t mine and leave some stains on the sheets…

    That’s illegal. There’s a law for that. There are also laws that protect digital assets in a similar way, and they fall under Cybercrime.

    Why don’t you just go rape somebody? And clearly you have authorization to access that vagina or that butthole or mouth or however your fetish desires???

    Calm down there, Epstein.

    Just tell me you’ve been on Epstein’s Island… Jfc? Wtf is wrong with you, CeeBee_Eh?

    You suck at rage baiting. I’m advocating for exposing more of the emails and not letting people refer to it as “hacking”, and you’re so enraged by someone disagreeing with you that you literally call that person “Epstein”. I know mental health care isn’t much of a thing in the US, but please find some help. For all our sakes.