Skip to content

RFK Jr. Wants Every American to Be Sporting a Wearable Within Four Years

Technology
143 96 3.6k
  • 27 Stimmen
    5 Beiträge
    0 Aufrufe
    J
    Oh for sure. One of my kids favorite personalities is Mark Rober, who I also mostly approve of. It's just tough when he does collabs with people who I think are shallow and devoid of content, like Unspeakable. He strikes me as the type of channel who would be a stepping stone to mens rights/incel and then Joe Rogan.
  • 0 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • YouTube is getting rid of its Trending page and Trending Now list

    Technology technology
    51
    194 Stimmen
    51 Beiträge
    990 Aufrufe
    I
    Oh no! All those pages i block by turning my youtube history off!
  • Men are opening up about mental health to AI instead of humans

    Technology technology
    341
    521 Stimmen
    341 Beiträge
    23k Aufrufe
    kingthrillgore@lemmy.mlK
    If I had nothin else going on I'd probably do it
  • 85 Stimmen
    12 Beiträge
    136 Aufrufe
    cupcakezealot@lemmy.blahaj.zoneC
    i like how ask photos is not just a dumb idea but it's also a dumb name
  • 92 Stimmen
    42 Beiträge
    392 Aufrufe
    G
    You don’t understand. The tracking and spying is the entire point of the maneuver. The ‘children are accessing porn’ thing is just a Trojan horse to justify the spying. I understand what are you saying, I simply don't consider to check if a law is applied as a Trojan horse in itself. I would agree if the EU had said to these sites "give us all the the access log, a list of your subscriber, every data you gather and a list of every IP it ever connected to your site", and even this way does not imply that with only the IP you could know who the user is without even asking the telecom company for help. So, is it a Trojan horse ? Maybe, it heavily depend on how the EU want to do it. If they just ask "show me how you try to avoid that a minor access your material", which normally is the fist step, I don't see how it could be a Trojan horse. It could become, I agree on that. As you pointed out, it’s already illegal for them to access it, and parents are legally required to prevent their children from accessing it. No, parents are not legally required to prevent it. The seller (or provider) is legally required. It is a subtle but important difference. But you don’t lock down the entire population, or institute pre-crime surveillance policies, just because some parents are not going to follow the law. True. You simply impose laws that make mandatories for the provider to check if he can sell/serve something to someone. I mean asking that the cashier of mall check if I am an adult when I buy a bottle of wine is no different than asking to Pornhub to check if the viewer is an adult. I agree that in one case is really simple and in the other is really hard (and it is becoming harder by the day). You then charge the guilty parents after the offense. Ok, it would work, but then how do you caught the offendind parents if not checking what everyone do ? Is it not simpler to try to prevent it instead ?
  • 342 Stimmen
    43 Beiträge
    678 Aufrufe
    G
    highly recommend using containerized torrents through a VPN. I have transmission and openvpn containers. when the network goes down transmission can't connect since it's networked through the ovpn container. once the vpn is restored, everything restarts and resumes where it left off. ever since I've had this setup running, I haven't had a nastygram sent to me.
  • 141 Stimmen
    4 Beiträge
    49 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]