Hacker Newsnew | past | comments | ask | show | jobs | submit | wiml's commentslogin

I wouldn't think so. Regulatory capture is a pretty typical activity for a dominant company.

Why is this down voted? Happens all the time, the large corporations always try to block using regulatory capture.

People not liking the concept, but shooting the messenger? (But seems not downvoted anymore.)

"Regime" is mostly derogatory among the terminally online. It's an accurate description of any government, regulatory system, zone of applicability of a natural law, etc etc.

Lots of ferns where I live, and I've put fiddleheads in a few stirfries for the novelty of it. But some (bracken especially) are somewhat toxic or carcinogenic. Probably fine if you prepare them properly and don't eat them too often, but be aware.

This exact method was implemented back around the turn of the century by RSAC/ICRA. I think only MSIE ever looked at those tags. But it seems like they met the stated goal of today's age-verification proposals.

That's why I have a hard time crediting the theory that today's proposals are just harmlessly clueless and well intentioned (as dynm suggests). There are many possible ways to make a child-safe internet and it's been a concern for a long time. But, just in the last year there are simultaneous pushes in many regions to enact one specific technique which just happens to pipe a ton of money to a few shady companies, eliminate general purpose computing, be tailor made for social control and political oppression, and on top of that, it isn't even any better at keeping porn away from kids! I think Hanlon's razor has to give way to Occam's here; malice is the simpler explanation.


Even better, the site could just tell the browser that there's age-sensitive content and the browser could check it. There are already standards for this!

The problem is, it doesn't give a legally-enforced monopoly to any rent seeking data brokers, and it doesn't act as a foot in the door for requiring government-ID attribution of all internet activity everywhere.


Don't think he knows about second sourcing, Pip.


You still need to have privileges to become the userid of the user logging in. Openssh does do privsep, but you still need a privileged daemon.


I think you need something like it in order to have a print representation of a cons cell whose cdr is not a cons-or-nil. And it's nice if your print representations are readable.


PPC32/64 of course, and for a long time Darwin still contained remnants of its predecessor's support for SPARC, PA-RISC, and m68k.


That's not "full self driving" by any stretch of the imagination. Where are these goalposts again?


My supposed goal posts are whether AI is useful or not, not the brain farts of libertooniian nut jobs who had covid one too many times and destroyed their own high level mental function.

I mean when the chief current libertoonian talking points are we should flood the internet with AI generated child porn to reduce pedophilia, that Greta Thunberg is the Antichrist, or that the most important decision your daughter faces right now is whether she should study to be an engineer or become a sex worker, they have exited the room of serious conversation and entered the insane asylum across the board. I wish we could ignore them but they have the Zeitgeist. Stupid Zeitgeist


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: